Richardson v. State

Anthony J. Richardson v. State of Maryland, No. 46, September Term, 2021. Opinion by Biran, J. CONSTITUTIONAL LAW – FOURTH AMENDMENT – ABANDONMENT – After a school resource officer broke up a fight in which Petitioner was involved, Petitioner’s backpack dropped from his body to the ground. Petitioner reached for the backpack, but the officer picked up the backpack before Petitioner could do so. Without a further word, Petitioner fled the scene. The Court of Appeals held that, in these circumstances, Petitioner relinquished his reasonable expectation of privacy in his backpack and therefore abandoned it for purposes of the Fourth Amendment. Thus, the officer was permitted to search the backpack without a warrant. CONSTITUTIONAL LAW – FOURTH AMENDMENT – PARTICULARITY – CELL PHONE SEARCH WARRANT – When the officer searched Petitioner’s backpack, he discovered, among other things, a firearm and three cell phones. Police eventually obtained a warrant to search one of those cell phones. The Fourth Amendment mandates that a search warrant must “particularly describ[e] the place to be searched, and the persons or things to be seized.” Here, even considering the incorporated supporting affidavit, the warrant to search the cell phone did not include any temporal limitation, it did not limit the contents or types of files on the cell phone that could be accessed and searched, and it contained no search protocols limiting how the officers could search for the evidence of the crime at issue. Instead, it contained catchall language that authorized officers to search everything on the phone. The Court of Appeals held that the search warrant violated the Fourth Amendment’s particularity requirement, and thus was invalid. CONSTITUTIONAL LAW – FOURTH AMENDMENT – GOOD FAITH EXCEPTION – The Court of Appeals held that the police officers acted reasonably in relying on the search warrant for Petitioner’s cell phone. The incorporated supporting affidavit could reasonably be read to limit the search to evidence of the crime of robbery. In the absence of a decision of this Court stating that such a warrant would not satisfy the particularity requirement, the officers did not act unreasonably in relying on the warrant. Circuit Court for Prince George’s County IN THE COURT OF APPEALS Case No. CT18-1622X Argued: March 3, 2022 OF MARYLAND No. 46 September Term, 2021 ANTHONY J. RICHARDSON v. STATE OF MARYLAND *Getty, C.J. Watts Hotten Booth Biran Battaglia, Lynne A. (Senior Judge, Specially Assigned) McDonald, Robert N. (Senior Judge, Specially Assigned), JJ. Opinion by Biran, J. Filed: August 29, 2022 *Getty, C.J., now a Senior Judge, participated in the hearing and conference of this case while an active member of this Court. After being recalled Pursuant to Maryland Uniform Electronic Legal Materials Act pursuant to Maryland Constitution, Article IV, (§§ 10-1601 et seq. of the State Government Article) this document is authentic. Section 3A, he also participated in the decision 2022-08-29 12:00-04:00 and adoption of this opinion. Suzanne C. Johnson, Clerk Chief Justice John G. Roberts observed in Riley v. California that modern cell phones are akin to powerful “minicomputers.”1 Because today’s smartphones contain information touching on “nearly every aspect” of a person’s life, “from the mundane to the intimate,” an unfettered search of a cell phone by law enforcement will “expose to the government far more than the most exhaustive search of a house.”2 In Riley, the Supreme Court considered the privacy implications of widespread smartphone use for one of the exceptions to the Fourth Amendment’s warrant requirement, a search incident to arrest. The Court concluded: Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans “the privacies of life.” The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple – get a warrant.[3] The privacy concerns implicated by cell phone storage capacity and the pervasiveness of cell phones in daily life do not fade away when police obtain warrants to search cell phones. In the case before us here, police did obtain a warrant to search a suspect’s cell phone. One of the questions we must decide in this case is whether that warrant complied with the Fourth Amendment’s requirement to describe with particularity 1 Riley v. California, 573 U.S. 373, 393 (2014). 2 Id. at 395-96 (emphasis deleted). 3 Id. at 403 (cleaned up). “the place to be searched, and the persons or things to be seized” 4 or whether it was, in effect, a “general warrant” that allowed police to engage in the type of exploratory rummaging that led the Founders to adopt the protections of the Fourth Amendment. After a school resource officer broke up a fight in which Petitioner Anthony J. Richardson was involved, Richardson’s backpack dropped from his body to the ground. The officer and Richardson reached for the backpack simultaneously; the officer picked it up before Richardson could do so. Richardson then ran from the scene. Soon afterwards, the officer opened the backpack. Among its contents were a firearm, three cell phones, and Richardson’s school ID card. Further investigation established that one of the phones in Richardson’s backpack had been stolen in a robbery three days earlier. The police connected one of the other phones in the backpack to the perpetrators of that robbery, after which they obtained a warrant to search that cell phone. The warrant authorized the officers to search for “[a]ll information, text messages, emails, phone calls (incoming and outgoing), pictures, videos, cellular site locations for phone calls, data and/or applications, geo-tagging metadata, contacts, emails, voicemails, oral and/or written communication and any other data stored or maintained inside of [the phone].” After he was charged in the Circuit Court for Prince George’s County with armed robbery and other offenses, Richardson moved to suppress the fruits of the warrantless search of his backpack and of the warranted search of the cell phone. The circuit court denied Richardson’s suppression motion as to both searches, and Richardson entered a 4 U.S. CONST. amend. IV. 2 conditional guilty plea under which he preserved his right to appeal the circuit court’s adverse suppression rulings. The Court of Special Appeals affirmed the circuit court’s denial of Richardson’s suppression motion. As discussed below, the warrantless search of Richardson’s backpack was permissible because Richardson abandoned the backpack before the officer searched it. With respect to the search of the cell phone, we conclude that the warrant failed to comply with the particularity requirement of the Fourth Amendment because it authorized investigators to search everything on the phone. However, based on the detailed information about the specific crime under investigation that was contained in the affidavit submitted as part of the application for the search warrant, which was incorporated into the warrant itself, we conclude that the officers reasonably relied on the warrant in executing the search of the cell phone. Thus, the good faith exception to the exclusionary rule applies to the fruits of the cell phone search. For this reason, we affirm the judgment of the Court of Special Appeals. I Background A. The Search of the Backpack On September 28, 2018, a large fight broke out behind Crossland High School in Temple Hills, Maryland. Corporal Myron Young of the Prince George’s County Police Department, who served as a school resource officer at Crossland, responded to a call about the fight. When he arrived on the scene, Corporal Young saw approximately 30 students engaged in the melee. A young man later identified as Richardson was “throwing punches” 3 with other students when Corporal Young intervened. Corporal Young was familiar with most of the students at Crossland High School, but he did not recognize Richardson, who, it turned out, attended a different high school. Corporal Young grabbed another young man who was trying to punch Richardson from behind, effectively ending the fisticuffs in which Richardson specifically was involved. As Richardson got up from the ground, a backpack strapped across his body fell to the ground. Richardson and Corporal Young reached for the backpack at the same time, but it was Corporal Young who picked it up. Corporal Young thought it was suspicious that Richardson tried to grab the bag, instead of focusing on the other young men who were still fighting nearby. After Corporal Young picked up the bag, Richardson immediately fled the scene at “full speed.” Had Richardson not fled, Corporal Young would have detained him, as well as the other person with whom Richardson had been fighting. When Corporal Young picked up the backpack, he noticed that the “bag had a decent amount of weight to it,” and he “suspected that there was most likely a weapon in the bag.” Within one or two minutes of his picking up the bag and Richardson’s flight, Corporal Young opened the backpack. He did not pat the backpack down before opening it. In the backpack, Corporal Young saw a silver and gray Smith & Wesson semiautomatic handgun. He also found an identification card for Richardson associated with a different school, three cell phones, and some cash, among other items. Based on his review of Richardson’s school ID card, Corporal Young was able to positively identify Richardson as the person he saw drop the backpack and flee. 4 B. The Police Connect Richardson to an Armed Robbery. One of the cell phones found in Richardson’s backpack was a Rose Gold iPhone 8+ that subsequently was determined to have been stolen from Jonathan James-Parks in an armed robbery in District Heights, Maryland, on September 25, 2018. James-Parks had arranged to buy a PlayStation 4 from a seller on the mobile marketplace application “letgo.” When he arrived at a pre-arranged meeting point to complete the purchase, a man asked James-Parks if he was “Jonathan.” When James-Parks said he was, another individual came out from a concealed location wearing a mask, pointed a handgun at James-Parks, and demanded that James-Parks hand over his property. James-Parks gave the robber his iPhone and his wallet containing approximately $140 in cash, debit cards, and other items. The two assailants fled the scene, and James-Parks reported the robbery to police. James-Parks gave police the letgo account information for the person who had agreed to sell him the PlayStation 4. One of the other phones in Richardson’s backpack was a T-Mobile Space Gray iPhone SE with an International Mobile Equipment Identity (“IMEI”5) number of 356600080434043 (the “T-Mobile iPhone SE”). Police sent a message to the letgo account that the purported seller of the PlayStation 4 had used to communicate with James-Parks. 5 Regarding an IMEI number, one wireless carrier advises customers: “Think of [the IMEI number] as your phone’s fingerprint – it’s a 15-digit number unique to each device. Phone carriers and manufacturers share IMEI numbers to enable tracking of smartphones that may be stolen or compromised.” What to Understand About IMEI Numbers, Verizon Wireless, Aug. 25, 2021, available at https://perma.cc/HN7B-UW98. 5 The T-Mobile iPhone SE then produced an alert that it had received a message via the letgo application. C. The Warrant to Search the T-Mobile iPhone SE On October 12, 2018, Detective M. Lembo6 of the Prince George’s County Police Department applied for a warrant to search the T-Mobile iPhone SE. In the section of Detective Lembo’s supporting affidavit titled “PROBABLE CAUSE (FACTUAL BASIS),” Detective Lembo included the information described above about the armed robbery of James-Parks on September 25. Detective Lembo also provided an account of the fight at Crossland involving Richardson on September 28, as well as Corporal Young’s recovery of the backpack and the handgun and cell phones that were in it, including the Rose Gold iPhone 8+ and the T-Mobile iPhone SE. Detective Lembo further wrote in the affidavit that, “[w]hile in possession of the T-Mobile Space Gray iPhone SE IMEI: 356600080434043 a message was sent to the suspect LetGo account by [another detective]. The T-Mobile Space Gray iPhone SE IMEI: 356600080434043 then produced an alert that it had just received a message via the LetGo application.” Detective Lembo continued: This Detective believes that the T-Mobile Space Gray iPhone SE IMEI: 356600080434043 could contain text messages, emails, phone calls (incoming and outgoing), pictures, videos, cellular site locations for phone calls, data and/or applications, geo-tagging metadata, contacts, emails, 6 Only the first letter of Detective Lembo’s first name is included in the warrant materials. 6 voicemails, oral and/or written communication and any other data stored within the cell phone that are related to the [crime7]. In the section of the affidavit entitled “JUSTIFICATION FOR THE PLACE TO BE SEARCHED AND ITEMS TO BE SEIZED,” Detective Lembo wrote: Your affiant knows that when crimes are committed by more than one person, the individuals committing the crime communicate in advance to plan the crime. When cellular phones are used, certain information is generated and stored in the cellular phone, including call records, text messages, video messages, and picture messages. Furthermore, the call records can created [sic] connections between co-conspirators by showing the contact and communication they have leading up to the crime. Finally, the contact lists maintained in the phone can show a connection between the phone number whose records are being analyzed and a suspects [sic] being investigated. Next, in the “DESCRIPTION OF THE ITEMS TO BE SEIZED,” Detective Lembo sought approval to seize “[a]ll information, data, photographs, videos, detail logs, contact 7 Detective Lembo included an apparent typographical error at this point in the affidavit. Detective Lembo referred to the crime as “carjacking,” but there was no carjacking mentioned in the affidavit. Rather, Detective Lembo only described the armed robbery of Jonathan James-Parks. In describing his duties elsewhere in the affidavit, Detective Lembo stated that he “investigates citizen armed robberies, shootings, and carjacking.” A plausible explanation for this error in identifying the crime under investigation as carjacking is that Detective Lembo drafted the affidavit for this search warrant using an earlier affidavit involving a carjacking as a template, and inadvertently retained a reference to “carjacking” in this affidavit. It appears Detective Lembo made a similar error earlier in the affidavit when writing that there was probable cause to believe that “there is property subject to seizure under the laws of this State and more particularly in violation of Annotated Code of Maryland Section CR-3.405(b)1.” Section 3-405(b) of the Criminal Law Article prohibits carjacking. Richardson did not argue in the circuit court, nor has he argued on appeal, that the erroneous references to carjacking in the affidavit rendered the search warrant defective or otherwise provide any basis for suppression of the evidence obtained in the search of the T-Mobile iPhone SE. 7 lists, and call histories maintained inside of T-Mobile Space Gray iPhone SE IMEI: 356600080434043[.]” (Line break omitted.) A Judge of the Circuit Court for Prince George’s County noted that the affidavit was subscribed and sworn in his presence on October 12, 2018. On the same date, the same Judge signed a search warrant directed to Detective Lembo stating: Upon reviewing the Application and the accompanying Affidavit of Detective M. Lembo #3821, Prince George’s County Police Department, which is incorporated into this Warrant, I find there exists probable cause to issue this Search and Seizure Warrant. You are therefore commanded with the necessary and proper assistants to search forthwith the following place, person, and/or motor vehicle and seize the following specified items: 1. You shall conduct a search on the place, person, and/or motor vehicle located at: T-Mobile Space Gray iPhone SE IMEI: 356600080434043 You shall seize the following items, evidence, and/or contraband: All information, text messages, emails, phone calls (incoming and outgoing), pictures, videos, cellular site locations for phone calls, data and/or applications, geo-tagging metadata, contacts, emails, voicemails, oral and/or written communication and any other data stored or maintained inside of T-Mobile Space Gray iPhone SE IMEI: 356600080434043. The warrant further instructed the officers: Upon execution of this Warrant, you shall leave an inventory of the items seized, together with a copy of this Warrant, Application, and supporting Affidavit (unless previously sealed by court order) with the person from whom the items are seized, or with the person in charge of the premises, or if neither of those persons is present, then in a conspicuous place on the premises. 8 D. Additional Investigation Police obtained documents from letgo, which indicated that the letgo account associated with the purported seller of the PlayStation 4 was registered to Malicai Hezekiah Grant. James-Park subsequently identified Grant as the person who asked him if he was Jonathan, prior to the masked assailant threatening him with a handgun and demanding that he hand over his property. James-Park also identified the Rose Gold iPhone 8+ found in Richardson’s backpack as his own, and told the police that the handgun found in Richardson’s backpack looked like the one that was used to rob him. The search of the T-Mobile iPhone SE revealed text messages between Richardson and Grant discussing and planning robberies through use of the letgo app. Police extracted approximately 6,000 pages of material from the T-Mobile iPhone SE. On December 20, 2018, Richardson was indicted in the Circuit Court for Prince George’s County on charges of armed robbery with a dangerous weapon, assault in the first degree, use of a firearm in the commission of a felony, possession of a regulated firearm by a person under 21, and related offenses. E. The Suppression Hearing and Conditional Guilty Plea Richardson moved to suppress evidence discovered in the warrantless search of the backpack and in the warranted search of the T-Mobile iPhone SE. At the motions hearing, Richardson argued that the warrant to search the cell phone constituted a forbidden general warrant because it permitted police to search and seize “any and all information” and “any and all data.” He also argued that the good faith exception to the exclusionary rule was inapplicable because “the warrant is so lacking [in] particularity that [an] officer would not 9 be able [to] reasonably rely on it[.]” The State argued that the warrant was valid under the Fourth Amendment. The State then called Corporal Young as a witness. Corporal Young testified about the fight at Crossland and Richardson’s immediate flight from the scene after Corporal Young picked up the backpack. Richardson did not call any witnesses. Richardson’s attorney argued that Corporal Young unlawfully searched the backpack, and that Richardson did not abandon it when he ran away. The circuit court credited Corporal Young’s testimony and denied Richardson’s motion. The court ruled that Corporal Young lawfully searched the backpack, and, alternatively, that Richardson abandoned the backpack when he ran away. The court also denied Richardson’s motion to suppress the fruits of the cell phone search, rejecting Richardson’s argument about the “alleged defect in the [search] warrant.” On September 18, 2019, Richardson entered a conditional guilty plea to conspiracy to commit robbery and wearing, carrying, and transporting a handgun. Richardson preserved his right to appeal the circuit court’s denial of his suppression motion. The court subsequently sentenced Richardson to four years of imprisonment, all but one year suspended (to serve on home detention), on the conspiracy count. The court sentenced Richardson to three years on the handgun charge, all suspended, consecutive to the sentence on the conspiracy count. F. Appeal The Court of Special Appeals affirmed the circuit court’s denial of Richardson’s motion to suppress. Richardson v. State, 252 Md. App. 363 (2021). The court held that 10 Richardson abandoned the backpack, as Richardson did not retain “any reasonable expectation of privacy in the backpack” when he fled the area. Id. at 383. Thus, the court held, the warrantless search of the backpack did not violate the Fourth Amendment. See id. Having held that the Fourth Amendment did not apply to the search of the backpack because Richardson had abandoned it, the Court of Special Appeals did not address Richardson’s arguments concerning Corporal Young’s alleged lack of reasonable suspicion to search the backpack. Regarding the cell phone search warrant, the Court of Special Appeals opined that the warrant met the particularity requirement of the Fourth Amendment, based on the court’s conclusion that “the detailed, particularized facts provided in the application and affidavit were incorporated into the search warrant[.]” Id. at 390. The intermediate appellate court also held that, even if the search warrant did not pass Fourth Amendment muster, the good faith exception to the exclusionary rule applied because “the application and affidavit as incorporated into the search warrant issued by the court contained sufficient particularized facts for an officer to objectively and in good faith rely on the finding of probable cause by a detached, neutral magistrate.” Id. at 392. On October 4, 2021, Richardson filed a petition for a writ of certiorari, seeking review of the following questions, which we rephrase slightly: 1. Did the motions court improperly deny the motion to suppress the fruits of the warrantless search of Richardson’s backpack? a. Where an officer picked up Richardson’s bag and searched it immediately after the bag fell off Richardson’s person and Richardson reached to reclaim it, did the Court of Special Appeals err in ruling that Richardson abandoned the bag 11 because, when the officer reached for the bag at the same time and picked it up first, Richardson ran away? b. Assuming that the bag was not abandoned, did the motions court err in ruling that the search of the bag was lawful where the officer failed to articulate an objectively reasonable basis for believing Richardson was armed and dangerous? c. Assuming there was reasonable suspicion to believe that Richardson was armed and dangerous, did the officer impermissibly open the backpack without patting it down first, where, inter alia, the officer insufficiently explained why he skipped a pat-down, and the State did not introduce the backpack itself (or a photograph of it)? 2. Did the motions court improperly deny the motion to suppress the fruits of the search of the T-Mobile iPhone SE found inside the backpack? a. Despite being conducted pursuant to a warrant, did the search of the cell phone violate the particularity requirement of the Fourth Amendment because, in relevant part, the warrant authorized the search and seizure of “[a]ll information … and any other data stored or maintained inside” the phone? b. Did the Court of Special Appeals err in concluding that the warrant for the phone satisfied the particularity requirement because it incorporated the search warrant application and accompanying affidavit in support of it? c. Did the Court of Special Appeals err in concluding that even if the warrant was defective, the fruits of the search of the phone were still admissible under the good-faith doctrine? On November 10, 2021, we granted the petition. Richardson v. State, 476 Md. 418 (2021). 12 II Standard of Review The validity of a suppression ruling is a mixed question of law and fact. State v. Carter, 472 Md. 36, 54 (2021). This Court’s review of a circuit court’s denial of a motion to suppress evidence is “limited to the record developed at the suppression hearing.” Pacheco v. State, 465 Md. 311, 319 (2019) (internal quotation marks and citation omitted). We assess the record “in the light most favorable to the party who prevails on the issue that the defendant raises in the motion to suppress.” Norman v. State, 452 Md. 373, 386 (2017). We accept the trial court’s factual findings unless they are clearly erroneous. Carter, 472 Md. at 54-55. “The ultimate determination of whether there was a constitutional violation, however, is an independent constitutional evaluation that is made by the appellate court alone, applying the law to the facts found in each particular case.” Id. at 55 (internal quotation marks and citation omitted). We review any questions of law de novo, without any special deference to the views of the lower courts. Id. III Discussion The Fourth Amendment of the United States Constitution guarantees “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures[.]” U.S. CONST. amend. IV. The Fourth Amendment also provides that “no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Id. 13 The Supreme Court has often said that “‘the ultimate touchstone of the Fourth Amendment is ‘reasonableness.’” Riley v. California, 573 U.S. at 381-82 (quoting Brigham City v. Stuart, 547 U.S. 398, 403 (2006)). “It remains a cardinal principle that searches conducted outside the judicial process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment ̶ subject only to a few specifically established and well-delineated exceptions.” California v. Acevedo, 500 U.S. 565, 580 (1991) (internal quotation marks and citations omitted). Evidence obtained in violation of the Fourth Amendment will ordinarily be inadmissible under the exclusionary rule. Thornton v. State, 465 Md. 122, 140 (2019). However, the “significant costs” of the exclusionary rule have led the Supreme Court to deem it “applicable only ... where its deterrence benefits outweigh its substantial social costs.” Carter, 472 Md. at 55-56 (quoting Utah v. Strieff, 579 U.S. 232, 237 (2016)). The Supreme Court has recognized several exceptions to the exclusionary rule, including the good faith doctrine. See United States v. Leon, 468 U.S. 897 (1984). Under the good faith exception, evidence will not be suppressed under the exclusionary rule if the officers who obtained it acted in objectively reasonable reliance on a search warrant. Id. at 922-24. A. The Warrantless Search of Richardson’s Backpack Fourth Amendment protection from a warrantless search does not extend to property that has been abandoned by its owner. Stanberry v. State, 343 Md. 720, 731 (1996) (citations omitted). “By abandoning property, the owner relinquishes the legitimate expectation of privacy that triggers Fourth Amendment protection.” Id. In assessing whether property has been abandoned, “[f]irst, we ask whether the individual, by his 14 conduct, has exhibited an actual expectation of privacy; that is, whether he has shown that he sought to preserve something as private.” Bond v. United States, 529 U.S. 334, 338 (2000) (cleaned up). And “[s]econd, we inquire whether the individual’s expectation of privacy is one that society is prepared to recognize as reasonable.” Id. (cleaned up). The test for abandonment of property in a search and seizure context under the Fourth Amendment is distinct from the property law concept of abandonment. 1 Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment § 2.6(b) (6th ed. 2020, Dec. 2021 update) (citations omitted). In the law of property, “the question is whether the owner has … relinquished his interest in the property so that another, having acquired possession, may successfully assert his superior interest.” Id. However, “[i]n the law of search and seizure … the question is whether the defendant has, in discarding the property, relinquished his reasonable expectation of privacy so that its seizure and search is reasonable within the limits of the Fourth Amendment.” Id. (citation omitted). Thus, a person can retain a property interest in an item but at the same time relinquish their reasonable expectation of privacy in it. Id. “Although the Fourth Amendment abandonment inquiry focuses on the property owner’s actual expectation of privacy, a subjective question, courts must frequently rely on objective indications of the owner’s intent.” Stanberry, 343 Md. at 732; see also United States v. Basinski, 226 F.3d 829, 836 (7th Cir. 2000) (“Because this is an objective test, it does not matter whether the defendant harbors a desire to later reclaim an item; we look solely to the external manifestations of his intent as judged by a reasonable person possessing the same knowledge available to the government agents.”). A property owner’s 15 “intent may be inferred from words spoken, acts done, and other objective facts…. All relevant circumstances existing at the time of the alleged abandonment should be considered.” Duncan v. State, 281 Md. 247, 265 (1977) (citation omitted). In Stanberry, this Court enumerated several specific considerations for determining whether property was abandoned, including: 1) “the location of the property and … whether the area is secured”; and 2) “whether the owner requested a third party to watch or protect the property.” 343 Md. at 733. In this case, the objective facts indicate that Richardson intended to relinquish his privacy interest in the backpack when he fled the scene. After Corporal Young picked up the backpack, Richardson did not say anything to Corporal Young. He did not ask Corporal Young to hold on to the backpack for him until things calmed down in the area. He did not say he had to go, but would be back in a few minutes. He did not ask Corporal Young why he had picked up the backpack. He did not say, “That’s mine, please give it back to me.” Richardson did none of those things, nor did he say or do anything else after Corporal Young picked up the backpack to suggest that he intended to return to the scene and retrieve the backpack at a later time. Rather, as soon as he saw that Corporal Young had the backpack, Richardson ran off at “full speed.” Richardson knew he had not left the backpack in a secure location or in the care of a person who understood that he intended to return for it later.8 At that point, in light of what had just transpired, Richardson reasonably 8 On this point, compare United States v. Most, 876 F.2d 191, 192, 196-97 (D.C. Cir. 1989) (defendant did not abandon his bag, where he left it with store clerk after asking her to hold it for him before he left), with United States v. Nowak, 825 F.3d 946, 948-49 (8th Cir. 2016) (defendant held to have abandoned his backpack in the passenger seat of 16 understood that someone would look through the backpack, if for no other reason than to try to determine to whom it and its contents belonged. It is true that, before Corporal Young picked up the backpack, Richardson indicated that he wanted to retain possession of the backpack – and his expectation of privacy in its contents – by reaching for it. Based on this circumstance, Richardson contrasts this case with other abandonment cases in which individuals, upon seeing police, discarded objects while fleeing. This is a distinction without a difference. Richardson’s initial expression of intent to maintain his privacy interest in the backpack did not set that intent in stone. Richardson’s subsequent flight showed that he changed his mind. See Hawley v. Commonwealth, 144 S.E.2d 314, 315-17 (Va. 1965) (holding that the defendant abandoned his car in a motel parking lot when, after telling the manager that he would return in three or four days, the defendant did not do so and the car was still there when police were summoned more than a week later). A person’s intent to maintain their expectation of privacy in an object can change in a matter of days, as apparently was the case in Hawley, or in a few seconds, as occurred here. Richardson also attempts to distinguish this case from other abandonment-by-flight cases on the basis that, here, the flight followed a thwarted attempt to retain his property.9 his friend’s car when he fled the car following a traffic stop, and where he did not ask the friend to store or safeguard the backpack for him, but instead said nothing at all, “leaving the backpack behind and leaving [the friend] ‘amazed’ at [his] flight”). 9 In the trial court and before us, Richardson has conceded that Corporal Young did not unlawfully seize the backpack merely by picking it up from the ground. Nor do we 17 But this distinction, too, is immaterial. When someone sees a police officer, runs off, and discards an object while on the move, it is clear that the person, until the moment of discarding, manifested an intent to maintain their expectation of privacy in the object. The fact that Richardson manifested his pre-flight intent by reaching for his backpack, rather than by maintaining continuous possession of the backpack, is of no moment.10 In sum, despite Richardson’s initial reach for his backpack after it fell, we hold that Richardson relinquished all reasonable expectation of privacy in the backpack when he fled the scene. It follows that Richardson abandoned his backpack before Corporal Young searched it, and that the circuit court correctly denied Richardson’s motion to suppress evidence based on the warrantless search of the backpack.11 perceive, based on the record established at the motions hearing, that Corporal Young “meaningfully interfered” with Richardson’s possessory interest in the backpack merely by picking it up. See United States v. Jacobsen, 466 U.S. 109, 113 (1984); see also United States v. Va Lerie, 424 F.3d 694, 706 (8th Cir. 2005) (“Because seizure is defined as some meaningful interference with an individual’s possessory interests in his property, not all police interference with an individual’s property constitutes a Fourth Amendment seizure, i.e., the police do not seize property every time they handle private property.”). At the moment he picked up the bag, Corporal Young did not objectively indicate to Richardson that he (Corporal Young) intended to retain the backpack. By not asking Corporal Young to return the backpack and instead immediately fleeing, Richardson forewent the opportunity to learn what Corporal Young would have done with the backpack if Richardson had asked him to return it. 10 Richardson also notes that he fled only after being assaulted and while other fights were still in progress nearby. To the extent he argues that this circumstance undermines the trial court’s finding that he abandoned the backpack, we disagree. Corporal Young came to Richardson’s defense upon his arrival at the scene, after which the fighting in Richardson’s immediate area “pretty much stopped.” If Richardson was concerned about his safety, he could have remained with Corporal Young until all fighting came to an end. 11 Because Richardson abandoned the backpack, Corporal Young’s subsequent search of the backpack did not implicate the Fourth Amendment. Accordingly, like the 18 B. The Cell Phone Search Warrant 1. The Search Warrant Did Not Comply with the Fourth Amendment’s Particularity Requirement. To comply with the Fourth Amendment, a search warrant: (1) must be based on probable cause; (2) must be supported by oath or affirmation; and (3) must describe with particularity “the place to be searched, and the persons or things to be seized.” U.S. CONST. amend. IV; Groh v. Ramirez, 540 U.S. 551, 557 (2004). The search warrant that the officers executed on the T-Mobile iPhone SE complied with the first two of these requirements: it was based on probable cause, and it was supported by a sworn affidavit. However, it failed the particularity requirement. a. The Particularity Requirement The particularity requirement of the Fourth Amendment protects against general and overbroad warrants that leave the scope of the search to the discretion of law enforcement. See, e.g., State v. Jennings, 942 N.W.2d 753, 768 (Neb. 2020); see also Maryland v. Garrison, 480 U.S. 79, 84 (1987) (“The manifest purpose of [the] particularity requirement was to prevent general searches”; this “requirement ensures that the search will be carefully tailored to its justifications, and will not take on the character of the wide-ranging exploratory searches the Framers intended to prohibit.”); United States v. George, 975 F.2d 72, 75 (2d Cir. 1992) (particularity requirement prohibits police from “indiscriminate[ly] rummaging through citizens’ personal effects”). Court of Special Appeals, we will not address Richardson’s other contentions concerning the search of the backpack. 19 As alluded to at the outset of this opinion, the emergence of the modern cell phone as an omnipresent aspect of American life has presented challenges for the application of the Fourth Amendment that were previously unknown: Cell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person. The term “cell phone” is itself misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers. One of the most notable distinguishing features of modern cell phones is their immense storage capacity. Before cell phones, a search of a person was limited by physical realities and tended as a general matter to constitute only a narrow intrusion on privacy…. Most people cannot lug around every piece of mail they have received for the past several months, every picture they have taken, or every book or article they have read – nor would they have any reason to attempt to do so. Riley v. California, 573 U.S. at 393-94. The Court observed that the storage capacity of cell phones and the “apps” that provide “tools for managing detailed information about all aspects of a person’s life,” combined with the pervasiveness of cell phones in American society, made it “no exaggeration to say that many of the more than 90% of American adults who own a cell phone keep on their person a digital record of nearly every aspect of their lives – from the mundane to the intimate.” Id. at 395. These considerations, among others, led the Supreme Court to hold in Riley that imposing the requirement to obtain a warrant before searching a cell phone incident to arrest was necessary as a “meaningful constraint,” id. at 399, on the power of law enforcement officers to intrude on the “privacies of life” for many Americans. Id. at 403 (internal quotation marks and citation omitted). 20 “Vigilance in enforcing the probable cause and particularity requirements is … essential to the protection of the vital privacy interests inherent in virtually every modern cell phone and to the achievement of the ‘meaningful constraints’ contemplated in Riley.” Burns v. United States, 235 A.3d 758, 773-74 (D.C. 2020) (quoting Riley, 573 U.S. at 399). Courts are “obligated – as ‘subtler and more far-reaching means of invading privacy have become available to the Government’ – to ensure that the ‘progress of science’ does not erode Fourth Amendment protections.” Carpenter v. United States, 138 S. Ct. 2206, 2223 (2018) (quoting Olmstead v. United States, 277 U.S. 438, 473-74 (1928) (Brandeis, J., dissenting)). The particularity requirement is usually not difficult to apply in the “physical world.” See Adam M. Gershowitz, The Post-Riley Search Warrant: Search Protocols and Particularity in Cell Phone Searches, 69 VAND. L. REV. 585, 598 (2016) (“Gershowitz”). For example, if police officers apply for a search warrant based on testimony from an informant that a suspect is involved in drug trafficking without specifying the location where the illegal activity is occurring, a judge should not automatically issue warrants for the suspect’s home, office, car, and person. See id. (“Absent some limitation curtailing the officers’ discretion when executing the warrant, the safeguard of having a [judicial officer] determine the scope of the search is lost.”) (citing George, 975 F.2d at 76). Instead, in that situation, the judge “should demand more information about where the narcotics are likely to be found so that the search warrant can be tailored to a particular location where there is probable cause to believe narcotics will be located.” Id. 21 The particularity requirement is arguably of even greater importance in the context of computers and smartphones than it is in the physical world, given the ability of smartphones to store “millions of pages of text, thousands of pictures, or hundreds of videos,” Riley, 573 U.S. at 394, and of computers to store much more still. See United States v. Otero, 563 F.3d 1127, 1132 (10th Cir. 2009) (“The modern development of the personal computer and its ability to store and intermingle a huge array of one’s personal papers in a single place increases law enforcement’s ability to conduct a wide-ranging search into a person’s private affairs, and accordingly makes the particularity requirement that much more important.”). Without understating the problem posed by a general warrant to search someone’s home prior to the digital age, a general warrant to search a computer or a smartphone today magnifies that problem exponentially. Yet, it has proven to be more challenging for law enforcement agencies and courts to apply the particularity requirement in the digital world than in the physical world. As electronic data can be hidden in multiple formats and places in a cell phone, or on a computer, it can be difficult for officers to specify in advance the sections of the device that should be searched. See Gershowitz at 599. And issuing judges have sometimes been caught between a rock and a hard place, attempting to ensure the particularity that the Fourth Amendment requires without unduly hampering law enforcement officers from obtaining the evidence that the affiant has shown is probably located somewhere in a cell phone or another electronic device. In recent years, issuing judges around the country have attempted to strike the proper balance by including reasonable restrictions on officers’ authority to search cell phones and other electronic devices. Those restrictions have varied 22 depending on the facts and circumstances of the specific cases before the issuing judges. They have included the following: i. Restricting “How”: Search Protocols Some issuing judges have denied law enforcement’s requests for cell phone search warrants where agents did not provide a search protocol or provided one that was too general. See Gershowitz at 617-18. In In re Cellular Telephones, No. 14-MJ-8017-DJW, 2014 WL 7793690 (D. Kan. Dec. 30, 2014), United States Magistrate Judge David J. Waxse declined to issue a warrant authorizing agents to search cell phones in the custody of the U.S. Drug Enforcement Administration for “any names, addresses, telephone numbers, text messages, digital images, video depictions, or other identification data or communications that are evidence of [certain drug crimes]” without including a search warrant protocol that appropriately limited how the agents could search for such items. Id. at *1. Judge Waxse stated that [t]he government must provide the court with as specific a description of the place to be searched and the things to be seized as the circumstances reasonably allow. Failure to do so “offends the Fourth Amendment because there is no assurance that the permitted invasion of a suspect’s privacy and property are no more than absolutely necessary.” [Electronically stored information], by its nature, makes this task a complicated one. Regarding the place to be searched, … in the digital universe, particular information is not accessed through corridors and drawers, but through commands and queries. As a result, in many cases, the only feasible way to specify a particular ‘region’ of the [device] will be by specifying how to search. Similarly, in attempting to describe the things to be seized, often the way to specify particular objects or spaces will not be by describing their physical coordinates but by describing how to locate them. By providing a search protocol explaining how it will separate what is permitted to be seized from what is not, the government can more easily and satisfactorily explain to the court how it will decide where it is going to search. 23 Id. at *8 (footnotes and citations omitted). Judge Waxse advised that, when the government provides a proposed search protocol, it “should not compromise the thoroughness of its description by trying to avoid the use of technical language. In fact, the court wants a sophisticated technical explanation of how the government intends to conduct the search[.]” Id. (internal quotation marks and citations omitted). Judge Waxse denied the government’s application for a search warrant without prejudice to resubmission “once it includes a search protocol that addresses the [court’s] concerns.” Id. at *11. United States Magistrate Judge John M. Facciola similarly denied without prejudice an application to search an iPhone where the government did not provide a proposed search protocol. Matter of the Search of Apple iPhone IMEI 01388803738427, 31 F. Supp. 3d 159, 169 (D.D.C. 2014). Judge Facciola stated that “a sufficient search protocol, i.e. an explanation of the scientific methodology the government will use to separate what is permitted to be seized from what is not, will explain to the Court how the government will decide where it is going to search – and it is thus squarely aimed at satisfying the particularity requirement of the Fourth Amendment.” Id. at 166. In providing guidance to the government about what would satisfy the Fourth Amendment, Judge Facciola explained: [T]his Court is not requiring a search protocol so that it may specify how the warrant is to be executed. Instead, the protocol will explain to the Court how the government intends to determine where it will search (which “parts” – or blocks – of the iPhone’s … flash drive) and how those decisions with respect to how the search will be conducted will help limit the possibility that locations containing data outside the scope of the warrant will be searched…. Instead of identifying [which] specific blocks of the iPhone’s flash drive will be searched ahead of time – which would be impossible – the Court is instead asking the government to explain its methodology for determining, once it is 24 engaged in the search, how it will determine which blocks should be searched for data within the scope of the warrant…. This is a subtle but … constitutionally significant distinction. Id. at 167 (footnotes and citations omitted). Judge Facciola further explained that the general information he had previously received from the government concerning its search methods – that “it uses ‘keyword searches for related terms’ and ‘computer-assisted scans[]’” – while “a useful step in the right direction, … still do[es] not actually give the Court a search protocol as the Court has defined the term.” Id. at 168. In Judge Facciola’s view, “the government’s statement that it will use a ‘computer-assisted scan’ is equivalent to saying, … that it will seize ‘all records’ relevant to a particular crime. It tells the Court nothing about what will actually happen and does not provide a means of searching so that this Court is assured that it is the type of particularized search that the Fourth Amendment demands.” Id. Judge Facciola continued: The government need only tell the Court what it already intends to do and what it does in every other similar search of an iPhone. The government should not be afraid to use terms like “MD5 hash values,” “metadata,” “registry,” “write blocking” and “status marker,” nor should it shy away from explaining what kinds of third party software are used and how they are used to search for particular types of data. The Court is not dictating that particular terms or search methods should be used. Instead, the Court is attempting to convey that it wants a sophisticated technical explanation of how the government intends to conduct the search so that the Court may conclude that the government is making a genuine effort to limit itself to a particularized search. Id. Finally, Judge Facciola explained why requiring a search protocol should not make the government concerned that it is forever limiting its ability to search more deeply in the phone: 25 Any concerns about being locked into a particular search protocol are unnecessary for two reasons. First, the government can always return for additional authorization of this Court as needed. Second, the application need only explain that some searches require additional techniques and that what is proposed is merely what the government intends to do at the time it submits its application, based on its experience searching such devices and in light of the particular data it seeks to seize. Id. (emphasis deleted).12 We do not suggest that judges who issue cell phone search warrants in Maryland must follow the practices of Judges Waxse and Facciola in any particular case. However, we find the observations of those judges concerning search protocols to be useful, and we recommend that issuing judges in Maryland consider including search protocols in cell phone search warrants in appropriate cases. To the extent issuing judges opt to include search protocols in cell phone warrants, it will be up to them, in the first instance, to decide how best to balance the Fourth Amendment’s particularity requirement with law enforcement’s need to search a cell phone for evidence of a crime, in crafting the search 12 Some courts have been reluctant to require search protocols specifying how search warrants for electronic devices should be executed. See, e.g., United States v. Garcia-Alvarez, No. 14-cr-0621, 2015 WL 777411, at *5 (S.D. Cal. Feb. 24, 2015) (concluding that cell phone search warrant was sufficiently particular; “[a]lthough it may have been better if the warrant had included a search protocol that minimized unnecessary intrusion into Defendant’s personal data,” precedent did not require such protocols); United States v. Brooks, 427 F.3d 1246, 1251 (10th Cir. 2005) (“This court has never required warrants to contain a particularized computer search strategy.”); United States v. Upham, 168 F.3d 532, 537 (1st Cir. 1999) (“The warrant process is primarily concerned with identifying what may be searched or seized – not how – and whether there is sufficient cause for the invasion of privacy thus entailed.”); United States v. Lustyik, 57 F. Supp. 3d 213, 229 (S.D.N.Y. 2014) (noting in computer and cell phone search case that the Second Circuit does not require search protocols). 26 protocol. We expect that law enforcement officers who apply for cell phone search warrants will suggest specific search protocols in appropriate cases. ii. Restricting “Where, What, and When”: Limiting the Search to Specific Areas or Content in a Cell Phone, or for Specific Time Frames In some cases, rather than requiring search protocols, which restrict how law enforcement officers search a cell phone, issuing judges may decide to impose limits on where the officers may search in the phone, or on what specifically they may look for, and for which time period(s). See Gershowitz at 629 et seq.; State v. Fairly, 457 P.3d 1150, 1154 (Wash. Ct. App. 2020). For example, if there is probable cause to believe that evidence of a crime will be found in text messages, but not in photos, videos, or any other applications on a particular phone, then the issuing judge reasonably may limit the search warrant to the text messaging applications found on the phone, rather than authorize the officers to access the entire phone. See Gershowitz at 633. When the officers know the specific type of evidence they are looking for, and where the evidence is stored on a cell phone, the issuing judge may well decide to limit the officers’ search to those locations in order to comply with the particularity requirement. See, e.g., In re Nextel Cellular Telephone, No 14-MJ-8005, 2014 WL 2898262, at *13 (D. Kan. June 26, 2014) (observing that, “[j]ust as probable cause to believe that a stolen lawnmower may be found in a garage will not support a warrant to search an upstairs bedroom, probable cause to believe drug trafficking communication may be found in [a] phone’s … mail application will not support the search of the phone’s Angry Birds application”). Thus, we would expect that, in appropriate cases, issuing judges will limit searches of cell phones to specific applications 27 and/or types of applications that officers have reason to believe the suspect used in furtherance of the crimes under investigation. See United States v. Winn, 79 F. Supp. 3d 904, 919 (S.D. Ill. 2015) (“The major, overriding problem with the description of the object of the search – ‘any or all files’ – is that the police did not have probable cause to believe that everything on the phone was evidence of the crime of public indecency.”). In some cases, it may be sufficient to limit the officers to search for specific items on the phone. For example, if there is probable cause to believe that a suspect used a friend’s phone to record a sex crime, the issuing judge reasonably could limit the search of that phone to the recording itself (in the absence of the affiant explaining why there was probable cause to believe that evidence of the crime would be contained in other items on the phone). That would presumably authorize a narrow search of any application on the phone that could have made or stored the recording. Perhaps the most common limitation that issuing judges should consider including in a warrant to satisfy the particularity requirement is a temporal restriction. In this regard, Commonwealth v. Snow, 160 N.E.3d 277 (Mass. 2021), is instructive. In Snow, following a shooting, the police obtained a search warrant to search the defendant’s cell phone for the following information: Cellular telephone number; electronic serial number, international mobile equipment identity, mobile equipment identifier or other similar identification number; address book; contact list; personal calendar, date book entries, and to-do lists; saved, opened, unopened, draft, sent, and deleted electronic mail; incoming, outgoing, draft, and deleted text messages and video messages; history of calls sent, received, and missed; any voicemail messages, including those that are opened, unopened, saved, or deleted; GPS information; mobile instant message chat logs, data and contact 28 information; internet browser history; and any and all of the fruits or instrumentalities of the crime of Murder. Id. at 281-82. The detective asked for and received permission to search without any date restriction because “it was unknown ‘when the weapon used was acquired and when any related conspiracy may have been formed.’” Id. at 282. The Supreme Judicial Court of Massachusetts held that “the lack of time restriction rendered the warrant impermissibly broad,” and remanded the case for a determination “whether the proffered evidence fell outside what would have been a reasonable temporal limit.” Id. at 285. The court opined that “[t]he magnitude of the privacy invasion of a cell phone search utterly lacking in temporal limits cannot be overstated.” Id. at 288. “Consequently, to be sufficiently particular, a warrant for a cell phone search presumptively must contain some temporal limit.” Id. (citing Winn, 79 F. Supp. 3d at 921; United States v. Zemlyansky, 945 F. Supp. 2d 438, 459 (S.D.N.Y. 2013)); see also Moats v. State, 455 Md. 682, 706 (2017) (Adkins, J., concurring) (“We should not condone a warrant authorizing police to search the entirety of a cell phone absent any temporal limitation on the information to be searched. A warrant of such generality raises the same concerns our Framers sought to address by crafting the Fourth Amendment.”). The Snow Court also suggested that, given the privacy interests at stake in a cell phone search, “the temporal restriction in an initial search warrant for a cell phone should err on the side of narrowness,” especially in light of the officers’ ability to apply for a new warrant if, during the initial search, they “uncover information giving rise to probable cause to broaden their search of the cell phone.” 160 N.E.3d at 288. The Court emphasized that “[d]etermining 29 the permissible parameters for a cell phone search is a fact-intensive inquiry and must be resolved based on the particular facts of each case.” Id. (citation omitted). iii. The Use of Catchall Terms That Allow Officers to Seize All Data on a Cell Phone Is Generally Not Permitted. Numerous courts have held that a search warrant that uses overbroad and/or “catchall” language effectively permitting the searching officers to seize all data on a cell phone or other electronic device is invalid. See, e.g., State v. Henderson, 854 N.W.2d, 616, 625, 633 (Neb. 2014) (warrants to search cell phones violated particularity requirement where they authorized a search of “[a]ny and all information,” as well as “any other information that can be gained from the internal components and/or memory Cards”); State v. Allen, 406 P.3d 89, 93 (Or. Ct. App. 2017) (holding that search warrant for cell phone failed the particularity requirement because it “placed no limitations on the types of files to be seized and examined”); Otero, 563 F.3d at 1132 (government conceded and reviewing court agreed that warrant “authorizing a search of ‘any and all information and/or data’ stored on computer” was “the sort of wide-ranging search that fails to satisfy the particularity requirement”); United States v. Clough, 246 F. Supp. 2d 84, 87 (D. Me. 2013) (warrant that authorized seizure of any and all text messages and digital images on computer was “clearly excessive” and was not sufficiently particularized); United States v. Fleet Mgmt. Ltd., 521 F. Supp. 2d 436, 439 (E.D. Pa. 2007) (warrant to search hard drives of three computers on a vessel lacked particularity because it sought “[a]ny and all data in the computers or contained in the computer storage devices, including, but not limited to, software and all records including e-mail, photographs, and documents relating to the 30 ship’s operation, engineering, maintenance, pollution control equipment, navigational charts, and crew”). We agree that, in general, such a warrant fails to comply with the particularity requirement. iv. Broader Searches Can Be Permitted Where There Is Probable Cause to Believe That a Narrower Search Will Miss Hidden or Mislabeled Evidence. With respect to a small subset of cases, most notably child pornography and financial crimes, experience has shown that some perpetrators purposely mislabel electronic files or hide evidence in unusual places. Thus, a search warrant authorizing a broad forensic analysis of a cell phone can be appropriate where the warrant limits the search for evidence of one of these crimes (but an issuing court should consider requiring the inclusion of search protocols to restrict how the searching officers conduct such an analysis). See Gershowitz at 633. We envision this exception as applying rarely. With respect to most cell phone search warrants, given the privacy interests at stake as explained in Riley, the particularity requirement is not satisfied by authorizing officers to search for any and all items that are evidence of a particular crime or crimes. See, e.g., Burns, 235 A.3d at 774-75 (search warrant invalid for lack of particularity where it authorized officers to search for “all records” and “any evidence” on the phones related to violations of the first-degree murder statute; “[t]he warrants imposed no meaningful limitations as to how far back in time police could go or what applications they could review and, instead, endorsed the broadest possible search without regard to the facts of the case or the limited showings of probable cause set forth in the affidavits”). “Particularity” in the context of the Fourth Amendment 31 does not refer to the particular crime(s) under investigation; rather, it refers to the particular “place to be searched, and the persons or things to be seized.” U.S. CONST. amend. IV. v. Summary There is no “one size fits all” solution for ensuring particularity in cell phone search warrants. In submitting and ruling upon every application for a cell phone search warrant, the affiant and the issuing judge must think about how to effectively limit the discretion of the searching officers so as not to intrude on the phone owner’s privacy interests any more than reasonably necessary to locate the evidence for which there is probable cause to search. “[T]he ultimate touchstone of the Fourth Amendment is reasonableness.” Riley, 573 U.S. at 381-82 (internal quotation marks and citation omitted). As discussed above, the affiant, in drafting the proposed warrant, and the issuing judge, in deciding what the warrant authorizes and requires, have a number of tools at their disposal. Among other things, affiants can suggest temporal restrictions as well as limitations on the applications that will be searched, with the understanding that they can later apply for a second, broader warrant if their initial search provides a basis to do so. Or the affiants can propose search protocols that will guide the agents in how to conduct their searches. If an issuing judge receives a proposed warrant that does not include any such suggested restrictions, the judge may require the affiant to add one or more of them in a revised warrant. Ultimately, the key point is that a search warrant for a cell phone must be specific enough so that the 32 officers will only search for the items that are related to the probable cause that justifies the search in the first place.13 b. The Warrant to Search the T-Mobile iPhone SE In the case before us, the search warrant that Detective Lembo obtained for the T-Mobile iPhone SE found in Richardson’s backpack authorized officers to search and seize the following: All information, text messages, emails, phone calls (incoming and outgoing), pictures, videos, cellular site locations for phone calls, data and/or applications, geo-tagging metadata, contacts, emails, voicemails, oral and/or written communication and any other data stored or maintained inside of T-Mobile Space Gray iPhone SE IMEI: 356600080434043. (Emphasis added.) Richardson argues that, in authorizing the officers to search for “all information” and “any other data stored or maintained inside of” the phone, the warrant violated the Fourth Amendment’s particularity requirement. We agree. The State does not dispute that the phrases italicized above are examples of “catchall” language that courts have determined to be impermissibly broad. Indeed, the State does not attempt to defend the constitutionality of the warrant based only on its language. Rather, the State contends that the warrant incorporated Detective Lembo’s 13 We recognize that the judges who review applications for cell phone search warrants have varying degrees of understanding of how cell phones work, what the applications on a phone are capable of doing, etc. Accordingly, we recommend that the Judicial College of Maryland develop a training course to help educate judges on matters that will likely be relevant to the consideration of cell phone search warrant applications, including search protocols and other potential limitations on cell phone searches. 33 supporting affidavit and that, when read to include that affidavit, the warrant satisfies the particularity requirement of the Fourth Amendment. We agree with those courts that have held that a court reviewing the validity of a search warrant “may construe [it] with reference to a supporting application or affidavit if the warrant uses appropriate words of incorporation, and if the supporting document accompanies the warrant.” Groh, 540 U.S. at 557-58 (summarizing federal appellate cases). The parties here dispute whether Detective Lembo’s affidavit accompanying the search warrant was incorporated in the warrant. We agree with the State that the record provides sufficient evidence to conclude that the affidavit was so incorporated. In approving the warrant, the issuing judge stated: “Upon reviewing the Application and the accompanying Affidavit of Detective M. Lembo #3821, Prince George’s County Police Department, which is incorporated into this Warrant, I find there exists probable cause to issue this Search and Seizure Warrant.” (Emphasis added.) The issuing judge further directed the officers: “Upon execution of this Warrant, you shall leave an inventory of the items seized, together with a copy of this Warrant, Application, and supporting Affidavit (unless previously sealed by court order) with the person from whom the items are seized[.]” (Emphasis added).14 It is clear from the plain language of the warrant that it incorporated Detective Lembo’s supporting affidavit. In addition, a reasonable inference to draw from the record is that the warrant, application, and affidavit were maintained as a single package. Defense 14 There is no indication in the record that Detective Lembo’s affidavit was ever sealed. 34 counsel was provided with all of these documents, and in fact, introduced them as a single exhibit at the suppression hearing. In addition, as the State notes (without dispute from Richardson), there is no indication in the record that police seized digital items that were not described in one of the specific categories outside of the “catchall” terms of the warrant and accompanying affidavit. Thus, we infer that the searching agents were given the affidavit (or were sufficiently apprised of its information verbally). If that had not been the case, they would not have known to look for the specific information about robberies using the letgo app that they discovered, and presumably they would have extracted reams of unrelated information that Richardson would have been able to point to as the product of a fishing expedition. For these reasons, we are able to conclude that Detective Lembo’s affidavit was incorporated into the warrant for purposes of assessing the particularity of the warrant. Regardless, the incorporation of the affidavit does not render this search warrant sufficiently particular under the Fourth Amendment.15 As Richardson observes, the affidavit also included catchall language. In the section of the affidavit entitled “DESCRIPTION OF THE ITEMS TO BE SEIZED,” Detective Lembo sought approval to seize “[a]ll information, data, photographs, videos, detail logs, contact lists, and call histories maintained inside of T-Mobile Space Gray iPhone SE IMEI: 356600080434043[.]” (Line break omitted; emphasis added.) Detective Lembo did not 15 However, as discussed below, the information in the affidavit is central to our determination that the searching officers reasonably relied on the issuance of the warrant and, therefore, that the good faith exception to the exclusionary rule applies here. 35 include any temporal restrictions or any other limitations on the proposed search in the affidavit that he then inadvertently failed to include in the proposed warrant itself. Just as the warrant approved the search of everything on the cell phone, the affidavit asked for permission to search for everything on the cell phone. It is beyond dispute that the affidavit did not establish probable cause to search everything on the T-Mobile iPhone SE. With respect to the vast majority of cell phone search warrants, we agree with the view expressed by Judge Adkins in her concurring opinion in Moats that this Court “should not condone a warrant authorizing police to search the entirety of a cell phone absent any temporal limitation on the information to be searched” because “[a] warrant of such generality raises the same concerns our Framers sought to address by crafting the Fourth Amendment.” Moats, 455 Md. at 706 (Adkins, J., concurring).16 In this case, there also should have been limitations placed on the applications that the officers were permitted to access when searching the phone. A warrant (with a 16 Our endorsement of the views Judge Adkins expressed in her concurring opinion in Moats does not require us to overrule or otherwise limit Moats. The issues before the Court in Moats were: (1) does an individual’s suspected involvement in a crime and a police officer’s belief that a cell phone could be used in that crime, without more, constitute probable cause to seize and search that individual’s cell phone; and (2) did the good faith exception to the exclusionary rule apply in Moats’s case? See Moats, 455 Md. at 693. The Majority first held that the post-arrest retention of Moats’s cell phone while officers applied for and obtained a search warrant was permissible. Id. at 696-98. With respect to the validity of the search warrant, particularity was not at issue. Rather, Moats claimed that the affiant did not establish probable cause to believe that evidence of a crime would be found on the phone. See id. at 698-99. The Majority concluded that the warrant was supported by probable cause, and did not reach the State’s alternative argument concerning the good-faith exception. See id. at 686, 701-03. Judge Adkins, joined by the Honorable Clayton Greene, Jr., concurred in the judgment, concluding that the good faith exception to the exclusionary rule was applicable to the warrant at issue. Id. at 706 (Adkins, J., concurring). 36 reasonable temporal restriction) that limited the officers to searching the letgo application, as well as texting and other communication applications, call logs, and navigation/location data for evidence relating to the crime of robbery, would have been reasonable. None of the State’s contentions persuades us that this cell phone search warrant, as supplemented by the affidavit, complied with the particularity requirement of the Fourth Amendment. First, the State asks to consider that some courts have upheld warrants authorizing expansive searches of cell phones. As an example, the State cites a Nebraska Supreme Court decision, State v. Short, 964 N.W. 2d 272 (Neb. 2021), cert. denied, 142 S. Ct. 1155 (2022). In that case, the Court disapproved of warrant language authorizing a search of “any and all” information when those terms were not linked to a specific crime, but permitted a cell phone warrant authorizing the search of wide swaths of available data where the warrant did not include such language. Id. at 316. The Court stated: The most important constraint in preventing unconstitutional exploratory rummaging is that the warrant limit the search to evidence of a specific crime, ordinarily within a specific time period, rather than allowing a fishing expedition for all criminal activity. We agree that a brief examination of all electronic data associated with a cell phone is usually necessary in order to find where the information to be seized is located, and such examination is reasonable under the Fourth Amendment. Id. (footnote omitted). Short highlights the shortcomings of the search warrant in this case. The search warrant for the T-Mobile iPhone SE did not contain any temporal limitations, and it did include language akin to the “any and all” phrasing that, as we have already explained, will not satisfy the particularity requirement in most cases. 37 Second, the State cites an Ohio case for the proposition that a catch-all provision in a warrant “must be read in conjunction with the list of particularly described items which preceded it pertaining to the crimes alleged.” State v. Maranger, 110 N.E.3d 895, 911 (Ohio Ct. App. 2018) (citation omitted). But in the section of Detective Lembo’s affidavit in which he described the items for which he was seeking authorization to search, he did not link those items to the robbery of Mr. James-Parks. Although Detective Lembo provided the information about the robbery in the probable cause section of the affidavit, it is the request to seize particular items – which was set apart in its own section of Detective Lembo’s affidavit – that has primary significance in assessing compliance with the particularity requirement.17 Moreover, nowhere in the affidavit did Detective Lembo explain why there was probable cause to believe that at least two of the categories of records he sought to seize – pictures and videos – would contain evidence of the robbery. This undercuts the State’s attempt to rely on the items that came after “[a]ll information [and] data” in Detective Lembo’s identification of the items for which he was seeking authority to search. Detective Lembo’s description of items to be seized reads more like a template than a carefully considered list of categories based on the affiant’s assessment of probable cause. Finally, we are unpersuaded by the State’s contention that we must assess the particularity requirement in light of the “Goldilocks problem” that confronts a police 17 For the same reason, and contrary to the State’s argument, severing the catchall language from either the warrant itself or the “description of the items to be seized” in the affidavit, would not cure the particularity problem. 38 officer who suspects that a cell phone contains evidence of a crime. According to the State, “[i]f investigators are too specific in describing what they plan to search, they risk being unable to discover evidence of a crime…. If police instead describe a broad range of items they wish to search on a phone, they run the risk of the warrant being characterized as an impermissible ‘general’ warrant. Under Richardson’s approach, they must draft language that is ‘just right,’ lest the warrant be ineffective or defective.” The Fourth Amendment requires that a search warrant be reasonable, not “just right,” in describing the items to be seized with particularity. Reasonable minds may differ on how best to draft a proposed search warrant so that it complies with the particularity requirement, given the unique facts and circumstances of a specific investigation. One issuing judge may believe that a temporal limitation is all that is required in a given case, while another issuing judge reviewing a similar case may decide that a warrant will be sufficiently particular if it allows the officers to search in only one or two applications on the phone in question. Courts reviewing the decisions that issuing judges make about how to comply with the particularity requirement should be mindful of the challenges inherent in the cell phone context. But, in the end, the Constitution demands particularity, and issuing judges therefore must ensure that all search warrants, including cell phone search warrants, are sufficiently particular. While reasonable minds may differ at times on whether a warrant is sufficiently particular, one thing is clear: given the privacy interests at stake, it is not reasonable for an issuing judge to approve a warrant that simply authorizes police officers to search everything on a cell phone. Because that is what the search warrant did in this case, it violated the particularity requirement of the Fourth Amendment. 39 2. The Good Faith Exception Applies, As Officers Executing the Warrant Acted Reasonably in Relying on the Warrant’s Validity. The exclusionary rule, which was adopted by the Supreme Court in Weeks v. United States, 232 U.S. 383, 389 (1914), and applied to the states through the Fourteenth Amendment to the United States Constitution, is “ordinarily ... the appropriate remedy for a violation of the Fourth Amendment.” Agurs v. State, 415 Md. 62, 76 (2010) (quoting Myers v. State, 395 Md. 261, 278 (2006)). When a court determines that a violation of the Fourth Amendment has occurred, however, exclusion of the fruits of the unreasonable search is not automatic. Herring v. United States, 555 U.S. 135, 137 (2009). Instead, the exclusion of evidence “has always been our last resort, not our first impulse.” Hudson v. Michigan, 547 U.S. 586, 591 (2006). The underlying rationale behind the exclusionary rule is to deter misconduct by law enforcement: The deterrent purpose of the exclusionary rule necessarily assumes that the police have engaged in willful, or at the very least negligent, conduct which has deprived the defendant of some right. By refusing to admit evidence gained as a result of such conduct, the courts hope to instill in those particular investigating officers, or in their future counterparts, a greater degree of care toward the rights of an accused. Where the official action was pursued in complete good faith, however, the deterrence rationale loses much of its force. Leon, 468 U.S. at 919 (internal quotation marks and citations omitted). Therefore, a reviewing court should only exclude evidence “if the law enforcement officer had knowledge, or may properly be charged with knowledge, that the search was unconstitutional under the Fourth Amendment.” Id. (internal quotation marks and citation omitted). The exclusionary rule does not apply where the officers reasonably relied on the issuance of the warrant. Id. That is the case because “the marginal or nonexistent benefits 40 produced by suppressing evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant cannot justify the substantial costs of exclusion.” Id. at 922. For these reasons, “suppression of evidence obtained pursuant to a warrant should be ordered on a case-by-case basis and only in those unusual cases in which exclusion will further the purposes of the exclusionary rule.” Id. at 918. There are four recognized circumstances in which an officer’s reliance on a search warrant would not be reasonable and the good faith exception therefore would not apply: (1) the issuing judge was misled by information in an affidavit that the officer knew was false or would have known was false but for the officer’s reckless regard for the truth; (2) the issuing judge wholly abandoned his or her detached and neutral judicial role; (3) the warrant was based on an affidavit that was so lacking in probable cause as to render official belief in its existence entirely unreasonable; and (4) the warrant was so facially deficient, by failing to particularize the place to be searched or the things to be seized, that the executing officers could not reasonably believe it to be valid. See Patterson v. State, 401 Md. 76, 104 (2007) (citing Leon, 468 U.S. at 923). Of these four situations, only the fourth one is at issue in this case. Richardson argues that the good faith exception should not apply here, because the officers who executed the search warrant should have known that the warrant did not meet the Fourth Amendment’s particularity requirement, and thus their reliance on the warrant was unreasonable. We disagree. 41 If Detective Lembo’s affidavit had not been incorporated into the warrant, the good faith exception would not be applicable.18 But the information in the affidavit, which was incorporated in the warrant, provided the executing officers with detailed information about the robbery under investigation, including the suspects’ use of the letgo app. Although we read the affidavit as seeking authorization to search for everything on the phone, an officer reading the affidavit reasonably could have interpreted it as limiting the search for evidence of the crime under investigation – i.e., the robbery of Jonathan James-Parks. Until today, this Court has not analyzed whether a cell phone search warrant that allows officers to search an entire phone for evidence of a particular crime satisfies the particularity requirement. Courts around the country have answered this question differently. Compare, e.g., Burns, 235 A.3d at 774-75 (search warrant invalid for lack of particularity where it authorized officers to search for “all records” and “any evidence” on the phones related to violations of the first-degree murder statute), with State v. Johnson, 576 S.W. 3d 205, 222 (Mo. Ct. App. 2019) (citing cases for the proposition that “the particularity requirement in a warrant authorizing the search of all data or all files in a cell phone is met so long as the warrant constrains the search to evidence of a specific crime”). In this opinion, we have stated that, in this case and with respect to the vast majority of Maryland cell phone search warrants, the answer to that question is “no.” But we cannot fault the officers who executed this search warrant for thinking that the answer was “yes.” 18 Thus, two of the cases upon which Richardson relies – Clough and Fleet Mgmt. – are distinguishable. In those cases, the affidavits in support of the search warrants were not incorporated into the warrants. See Clough, 246 F. Supp. 2d at 88; Fleet Mgmt., 521 F. Supp. 2d at 444. 42 In sum, the warrant – as supplemented by the incorporated affidavit – was not so facially deficient that the executing officers acted unreasonably in relying on it. Thus, the good faith exception to the exclusionary rule applies here.19 For this reason, we conclude that the circuit court properly denied Richardson’s motion to suppress the fruits of the warrant to search the T-Mobile iPhone SE. IV Conclusion Richardson abandoned his backpack when he fled from the scene of the fight without saying a word to Corporal Young about his backpack. Thus, the warrantless search of the backpack was constitutionally permissible. The warrant that authorized the search of the T-Mobile iPhone SE did not satisfy the particularity requirement of the Fourth Amendment, as it allowed police to search everything on the device. However, we conclude that the officers executing the search warrant acted reasonably in relying on the search warrant, and thus the good faith exception to the exclusionary rule applies here. Accordingly, the trial court properly denied Richardson’s motion to suppress evidence. JUDGMENT OF THE COURT OF SPECIAL APPEALS AFFIRMED; COSTS TO BE PAID BY PETITIONER. 19 With this opinion, we make clear to Maryland law enforcement officers and to issuing judges that a warrant that permits police to search everything on a cell phone, with no limitations whatsoever on the executing officers’ discretion, violates the particularity requirement of the Fourth Amendment. That understanding will necessarily inform a good-faith analysis with respect to any such cell phone search warrants that are issued after today. 43