State v. Taylor

IN THE SUPERIOR COURT OF THE STATE OF DELAWARE STATE OF DELAWARE, ) ) ) v. ) I.D. Nos. 1605012921A ) ) DIAMONTE TAYLOR, ) ) Defendant. ) MEMORANDUM OPINION Submitted: November 2, 2023 Decided: November 28, 2023 Upon Consideration of Defendant’s Motion to Suppress, DENIED. William H. Leonard, Esquire, John S. Taylor, Esquire, and Isaac A. Rank, Esquire Deputy Attorneys General, Department of Justice, Wilmington, Delaware. Attorneys for the State. Benjamin S. Gifford, IV, Esquire, The Law Office of Benjamin S. Gifford, IV, Wilmington, Delaware, and John A. Barber, Esquire, The Law Office of John A. Barber, Wilmington, Delaware. Attorneys for Defendant. MEDINILLA, J. I. INTRODUCTION Defendant Diamonte Taylor was previously convicted of and sentenced to life for first-degree murder and other gang-related crimes. On direct appeal, the Delaware Supreme Court found that the search warrant used to obtain evidence from his two smartphones was an unconstitutional general warrant, held that introduction of that evidence was not harmless, reversed Taylor’s murder and related convictions, and remanded the case for a new trial. In preparation for that new trial the State obtained a second warrant to search and seize information from Taylor’s two phones. Taylor is to be retried in the coming week. And he has now moved to suppress the evidence gathered via that second warrant. Taylor has also moved to exclude recordings of his communications from Department of Correction’s facilities that were obtained via an Attorney General’s subpoena. The Court issued a ruling on these requests several weeks ago. For the reasons stated below, Taylor’s Motion to Suppress is DENIED. II. FACTUAL AND PROCEDURAL BACKGROUND Diamonte Taylor was arrested by the Wilmington Police Department and the United States Marshals Service (“USMS”) on June 1, 2016, in relation to several gang-related shootings in May of 2016.1 He was subsequently indicted for Murder 1 State’s Response to Defendant’s Motion to Suppress ¶ 1 (D.I. 163) (hereinafter, “State’s Resp. to Def.’s Mot. to Suppress”). 2 in the First Degree, Gang Participation, Conspiracy in the First Degree, and multiple other violent felonies alleged to have taken place between January 23, 2015, and June 1, 2016.2 When Taylor was arrested, USMS found two smartphones on him.3 Law enforcement applied for a warrant to search those two phones (“First Search Warrant”).4 In his supporting affidavit, the applicant officer described the gang- related shootings and the personal connections amongst the gang members.5 On June 16, 2016, the First Search Warrant was approved by the Justice of the Peace Court and granted permission to search for and seize: any/all data stored by whatever means, or through normal course of business of wireless services, and/or through the forensic examination of said cellular telephone, to include but not limited to registry entries, pictures, photographs, images, audio/visual recordings, multi-media messages, web browsing activities, electronic documents, location information, text messaging, writings, user names, subscriber identifiers, buddy names, screen names, calendar information, call logs, electronic mail, telephone numbers, any similar information/data indicia of communication, and any other information/data pertinent to this investigation within said scope.6 Before his first trial, Taylor filed a motion to suppress all evidence from the 2 Defendant’s Motion to Suppress ¶ 1 (D.I. 162) (hereinafter, “Def.’s Mot. to Suppress”). 3 State’s Resp. to Def.’s Mot. to Suppress ¶ 1. 4 Taylor v. State, 260 A.3d 602, 609 (Del. 2021). 5 Id. 6 Id. (emphasis added). 3 two phones, arguing that the First Search Warrant was an unconstitutional general warrant. 7 This Court denied the motion. 8 A jury convicted Taylor of Murder in the First Degree, Gang Participation, Assault First Degree, two counts of Reckless Endangering First Degree, two counts of Aggravated Menacing, and numerous related firearm offenses. 9 He was sentenced to, inter alia, a mandatory life sentence for the first-degree murder count.10 Taylor filed a direct appeal. 11 In September 2021, the Delaware Supreme Court issued its decision reversing this Court’s judgment on the suppression issue, vacating Taylor’s convictions, and remanding the matter for a new trial.12 The Supreme Court held that the First Search Warrant was an unconstitutional general warrant that lacked the requisite particularity and “allowed investigators to conduct an unconstitutional rummaging through all of the contents of Taylor's smartphones to find whatever they decided might be of interest to their investigation.”13 With the matter now set for retrial, the State, on January 4, 2022, applied for and was granted a second search warrant (“Second Search Warrant”) allowing 7 D.I. 53. 8 D.I. 61. 9 D.I. 77. 10 D.I. 105. 11 Notice of Appeal filed on March 2, 2020 (D.I. 106). 12 Taylor, 260 A.3d at 619. 13 Id. at 615. 4 search of the same two phones. 14 The Second Search Warrant, approved by a Superior Court judge with knowledge of the Supreme Court’s ruling, authorized seizure of: data stored through normal course of business of wireless services, and/or through the forensic examination of said cellular telephone, to include registry entries, pictures, photographs, images, audio/visual recordings, multi-media messages, web browsing activities, electronic documents, location information, text messaging, writings, user names, subscriber identifiers, buddy names, screen names, calendar information, call logs, electronic mail, telephone numbers, any similar information/data indicia of communication, within the time frame of May 1, 2016 to June 1, 2016. 15 The affidavit to the Second Search Warrant explained that Taylor maintained public social media accounts where he posted photographs depicting gang members displaying gang signs via hand gestures. 16 Other photographs on those accounts included Taylor holding or displaying firearms. 17 The affidavit concluded that “the most convenient and popular mode of accessing and utilizing social media is a personal cellular phone. . . . therefore, [] evidence of the ongoing gang feud and the recent shootings where [Taylor] is a suspect would be located on his cellular phones.” 18 Finally, there was a specific averment that the Second Search Warrant’s 14 Def.’s Mot. to Suppress ¶ 7. 15 Def.’s Mot. to Suppress, Ex. A. 16 Id. Ex. A ¶ 14. 17 Id. 18 Id. 5 affidavit did “not contain any evidence that was obtained after the initial June 10, 2016, warrant application or from evidence obtained from the download of the cellular devices at issue.”19 Several months later, while investigating and preparing for the second trial, the Department of Justice served a subpoena duces tecum on the Delaware Department of Corrections (“DDOC”).20 This subpoena commanded the DDOC provide: [A]ll records regarding telephone and/or visiting room conversations for [Taylor] including, but not limited to any and all available approved phone number lists, GTL outgoing call log entries and conversations; video calls; tablet text messages; in- person meeting recordings; non-legal incoming and outgoing mail for the time period of April 21, 2018 through the present to be updated on a weekly basis until further notice.21 The State provided defense counsel with the materials obtained under this subpoena.22 Taylor filed a Motion to Suppress the evidence obtained from his two phones in its entirety as well as the evidence obtained from the DDOC via the later subpoena.23 The State filed a written response.24 And the parties docketed post- 19 Id. Ex. A ¶ 25. 20 Def.’s Mot. to Suppress, Ex. B. 21 Id. 22 Def.’s Mot. to Suppress ¶ 10. 23 See Def.’s Mot. to Suppress. 24 See State’s Resp. to Def.’s Mot. to Suppress. 6 hearing supplements on June 30, 2023. 25 While the matter was pending decision, the Court asked the parties to address the Delaware Supreme Court’s recent ruling in Thomas v. State.26 Both parties filed written supplements. 27 The Court then heard oral arguments during a conference conducted earlier this month.28 The next week, the Court notified parties of its decision to deny the Motion to Suppress with a written explanation of that ruling to follow.29 Taylor’s re-trial is scheduled to begin on December 4, 2023.30 III. PARTIES’ CONTENTIONS Taylor argues four grounds for suppression of the evidence he seeks to exclude.31 First, he contends that the Second Search Warrant is barred by the Law of the Case Doctrine and the Mandate Rule. 32 In Taylor’s view, the plain language of the Supreme Court’s decision striking the First Search Warrant requires 25 Defendant’s Post-Hearing Supplement (D.I. 167) (hereinafter, “Def.’s Post-Hearing Suppl.”); State’s Response to Defendant’s Post-Hearing Supplement (D.I. 169) (hereinafter, “State’s Resp. to Def.’s Post-Hearing Suppl.”). 26 Court’s Letter dated 10-25-2023 (D.I. 176) (hereinafter, “Ct.’s Letter dated 10-25-2023”). 27 Defendant’s Response to Court’s Letter dated 10-25-2023 (D.I. 177) (hereinafter, “Def.’s Resp. to Ct.’s Letter dated 10-25-2023”); State’s Response to Court’s Letter dated 10-25-2023 (D.I. 178) (hereinafter, “State’s Resp. to Ct.’s Letter dated 10-25-2023”). 28 Status Conference dated 11-02-2023 (D.I. 180) (hereinafter, “Status Conference dated 11-02- 2023”). 29 Court’s Letter dated 11-09-2023 (D.I. 181) (hereinafter, “Ct.’s Letter dated 11-09-2023”). 30 Status Conference dated 11-02-2023. 31 See Def.’s Mot. to Suppress. 32 Def.’s Mot. to Suppress ¶¶ 12-19. 7 suppression of the evidence gathered through execution of the Second Search Warrant. To Taylor, “[t]he Supreme Court’s mandate could not be clearer: [Taylor] is to be retried barring all taint from the fruits of the first general search warrant.”33 Second, Taylor says that application of the Independent Source Doctrine is improper and contrary to the search and seizure jurisprudence regarding electronic devices.34 Specifically, that “[w]ith the Second Warrant, the State seeks to wield the independent source doctrine to eviscerate the heightened privacy protections that blossomed in Riley and ultimately bloomed in Wheeler, Buckham, and Taylor.”35 Third, Taylor argues that the Second Search Warrant again fails the particularity requirement.36 Taylor posits that simply removing the terms “any/all” from the beginning of the search warrant is just an illusory change; the Second Search Warrant has remained substantively the same. 37 Fourth, Taylor complains that the subpoena served by the State on the DDOC was unreasonable and any evidence obtained under it should be excluded.38 In response, the State first insists that the Second Search Warrant passes 33 Id. ¶ 19. 34 Id. ¶¶ 20-29. 35 Id. ¶ 23. 36 Id. ¶¶ 30-35. 37 Id. ¶¶ 33-34. 38 Def.’s Mot. to Suppress ¶¶ 36-46. 8 constitutional muster under the Independent Source Doctrine. 39 Second, that the Second Search Warrant satisfies the particularity requirement and “within its four corners, contains profound evidence of criminality.” 40 Third, that the Law of the Case Doctrine and the Mandate Rule are inapplicable because the Supreme Court’s earlier decision focused on the defective form of the First Search Warrant, and did not prohibit a second warrant attempt. 41 Fourth, the State contends that the subpoena to DDOC was proper, 42 and that the scope of the communications sought was reasonable.43 IV. APPLICABLE LEGAL STANDARDS A. Search Warrants Eleven Del. C. § 2306 governs the issuance of search warrants and ensures compliance with the United States and Delaware Constitutions. In relevant part, Delaware search warrants must: [D]esignate the house, place, conveyance or person to be searched and the owner or occupant thereof (if any), and shall describe the things or persons sought as particularly as may be, and shall substantially allege the cause for which the search is made or the offense committed by or in relation to the persons or things searched for, and shall state that the complainant suspects that such persons or things are concealed in the house, place, conveyance or person 39 State’s Resp. to Def.’s Mot. to Suppress ¶¶ 9-17. 40 Id. ¶¶ 18-20. 41 Id. ¶¶ 21-23. 42 Id. ¶¶ 24-35. 43 Id. ¶¶ 36-38. 9 designated and shall recite the facts upon which such suspicion is founded. 44 Our Supreme Court has instructed that a finding of probable cause “must be based on the information that appears within the four corners of the application or affidavit.”45 And that a judge may find probable cause “when, considering the totality of the circumstances, ‘there is a fair probability that contraband or evidence of a crime will be found in a particular place.’”46 This Court’s Criminal Rule 41 requires that a motion to suppress “. . . state the grounds upon which it is made with sufficient specificity to give the state reasonable notice of the issues and to enable the court to determine what proceedings are appropriate to address them.”47 In recent years, our Supreme Court has recognized the constitutional challenges unique to search warrants issued for electronic devices and has explained “that a warrant—no matter its target—must both ‘describe the things to be searched with sufficient particularity and be no broader than the probable cause on which it 44 11 Del. C. § 2306. 45 Anderson v. State, 249 A.3d 785, 795 (Del. 2021) (citing Valentine v. State, 207 A.3d 566, 570 (Del. 2019)). 46 Sisson v. State, 903 A.2d 288, 296 (Del. 2006) (citing Stones v. State, 676 A.2d 907 (Del. 1996)). 47 Super. Ct. Crim. R. 41(f) (The court shall receive evidence on any issue of fact necessary to the decision of the motion, but the court shall not receive evidence on motions challenging the manner of execution of a search warrant or the veracity of a sworn statement used to procure a search warrant unless the motions are supported by affidavits, or their absence is satisfactorily explained in the motion, and the allegedly false statement is necessary to the finding of probable cause.) 10 is based.’”48 The Court has also cautioned that because of the volume of sensitive information stored on a smartphone, searches should be as limited as possible to avoid “exploratory rummaging” in a person’s other irrelevant information and belongings.49 B. Attorney General Subpoenas Twenty-nine Del. C. § 2504 sets forth the powers, duties and authority of the Department of Justice including the power to “investigate matters involving the public peace, safety and justice and to subpoena witnesses and evidence in connection therewith.” 50 V. DISCUSSION The Fourth Amendment to the United States Constitution guarantees: [t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.51 The Fourth Amendment functions “to safeguard the privacy and security of individuals against arbitrary invasions by governmental officials.”52 The United 48 Buckham v. State, 185 A.3d 1, 18 (Del. 2018) (citing Wheeler v. State, 135 A.3d 282, 299 (Del. 2016)) (emphasis added). 49 Buckham, 185 A.3d at 18 (citing Wheeler, 135 A.3d at 298). 50 29 Del. C. § 2504(4). 51 U.S. CONST. amend. IV. 52 Camara v. Mun. Court of City & Cnty. of San Francisco, 387 U.S. 523, 528 (1967). 11 States Supreme Court has made clear that search warrants are not mere formalities but serve a critical function.53 Absent some grave emergency, the Fourth Amendment has interposed a magistrate between the citizen and the police . . . . The right of privacy was deemed too precious to entrust to the discretion of those whose job is the detection of crime and the arrest of criminals. Power is a heady thing; and history shows that the police acting on their own cannot be trusted. And so the Constitution requires a magistrate to pass on the desires of the police . . . . 54 The Fourth Amendment prohibits general warrants that allow “exploratory rummaging in a person’s belongings,” and addresses this problem by requiring a ‘particular description’ of the things to be seized.55 In order for a search warrant to be deemed constitutional, it must conform to this particularity requirement.56 And “[t]he Fourth Amendment by its terms requires particularity in the warrant, not in the supporting documents.”57 Article I § 6 of the Delaware State Constitution provides a similar guarantee that: The people shall be secure in their persons, houses, papers and possessions, from unreasonable searches and seizures; and no warrant to search any place, or to seize any person or thing, shall 53 McDonald v. United States, 335 U.S. 451, 455 (1948). 54 McDonald, 335 U.S. at 455–56. 55 Andresen v. Maryland, 427 U.S. 463, 480 (1976) (quoting Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971)). 56 Groh v. Ramirez, 540 U.S. 551, 559 (2004) (citing Stanford v. Texas, 379 U.S. 476 (1965)). 57 Groh, 540 U.S. at 557 (citing Massachusetts v. Sheppard, 468 U.S. 981, 988 n.5 (1984)). 12 issue without describing them as particularly as may be; nor then, unless there be probable cause supported by oath or affirmation.58 A. Delaware law requires as much specificity as possible in search warrants pertaining to electronic devices. In Wheeler v. State, our Supreme Court considered, for the first time, “a challenge to warrants seeking to seize and search computer-based and digital items on the grounds that they are in the nature of a general warrant, unconstitutionally overbroad, and lack sufficient particularity.” 59 Coming after the seminal decision in Riley v. California, where the United States Supreme Court held that a warrant is generally required before searching a cell phone “even when a cell phone is seized incident to arrest,”60 Wheeler reiterated that to satisfy the particularity requirement, warrants “must describe what investigating officers believe will be found on electronic devices with as much specificity as possible under the circumstances.”61 The Court in Wheeler addressed the balance of interests between protecting a citizen’s right to privacy and the police powers of the state.62 Importantly, for 58 DEL. CONST., art. I, § 6. 59 Wheeler v. State, 135 A.3d 282, 302 (Del. 2016). 60 Riley v. California, 573 U.S. 373, 401 (2014). 61 Wheeler, 135 A.3d at 304. 62 Id. at 305 (citations omitted) (“We hesitate to prescribe rigid rules and instead reiterate that warrants must designate the things to be searched and seized as particularly as possible. Striking the correct balance when protecting against generality and overbreadth requires vigilance on the part of judicial officers who are on the front lines of preserving constitutional rights while assisting government officials in the legitimate pursuit of prosecuting criminal activity. Where, as here, the investigators had available to them a more precise description of the alleged criminal activity that is the subject of the warrant, such information should be included in the instrument and the search 13 warrants executed on electronic devices in the post-Riley context, our Supreme Court has noted that “[s]atisfying the particularity requirement is difficult in the electronic search warrant context, given the commingling of relevant and irrelevant information and the complexities of segregating responsive files ex ante.” 63 Our Supreme Court revisited the particularity requirement in Buckham v. State, finding that the search warrant there was unconstitutional as it had “expressly authorized search of materials there was no probable cause to search . . . .” 64 B. In Taylor v. State, the First Search Warrant was found to be a general warrant. As our Supreme Court noted in Wheeler, because reviewing courts consider both a search warrant’s validity and whether it was properly executed only after the search is completed, courts must contend with the commingling of relevant and irrelevant information while separating files before the search is even conducted. 65 In this case, our Supreme Court held that the First Search Warrant was a general warrant because it allowed “investigators to search for ‘any and all data’ and seizure should be appropriately narrowed to the relevant time period so as to mitigate the potential for unconstitutional exploratory rummaging.”) 63 Id. at 299–300. 64 Buckham v. State, 185 A.3d 1, 19 (Del. 2018). 65 See Adam M. Gershowitz, The Post-Riley Search Warrant: Search Protocols and Particularity in Cell Phone Searches, 69 Vand. L. Rev. 585 (2016) (suggesting that judicial officers should pre- emptively impose restrictions on cell phone search warrants at the time the warrants are issued.) 14 ‘pertinent to the criminal investigation’ [and was] unlimited in scope.”66 The Court further noted that when executing the First Search Warrant, “investigators apparently extracted almost all data from Taylor’s smartphones from an eleven-year time span, and then searched without restriction for evidence of criminal conduct.”67 This Court must now address whether the substance and form of the Second Search Warrant has sufficiently overcome the constitutional defects of the First Search Warrant. The Court finds that it does. C. The Second Search Warrant is not a general warrant. Through Wheeler, Buckham, Taylor, and most recently, Thomas v. State, our Supreme Court has established that a warrant that allows an unbridled “‘top-to- bottom search’ of ‘[a]ny and all store[d] data’” on such devices is constitutionally infirm.68 In Thomas, our Supreme Court instructed that “if a court determines that a warrant is general, it must suppress all evidence obtained pursuant to it.”69 But in the instance of an overly broad warrant, the reviewing Court may narrow it down “to strike out those portions of the warrant that are invalid for lack of probable cause, maintaining the remainder of the warrant that satisfies the Fourth Amendment.”70 66 Taylor v. State, 260 A.3d 602, 616 (Del. 2021). 67 Id. 68 Thomas v. State, __ A.3d __, 2023 WL 6379829, at *10-13 (Del. Oct. 2, 2023). 69 Id. at *13. 70 Id. (quoting Taylor, 260 A.3d at 617). 15 This Court now examines the four corners of the Second Search Warrant. The Second Search Warrant not only removed the any/all language that afflicted the First Search Warrant—it also imposed an additional temporal restriction on the data searched and seized to include only information from May 1, 2016 to June 1, 2016. The removal of the “any and all language” is not necessarily a cure-all—“the fact that the warrant does not use the language ‘any and all’ puts form over substance.”71 This Court now finds that these changes, taken together, did impose a meaningful restriction on the data the State searched and seized from Taylor’s mobile devices. The recent decision in Thomas v. State guides the Court’s particularity review. In Thomas, our Supreme Court held that this Court had appropriately redacted evidence from the issued search warrant to eliminate the sections that were lacking probable cause. 72 If needed, the same could be done here.73 71 State v. Freeman, 2023 WL 2854771, at *6 (Del. Super. Ct. Apr. 9, 2023). Nor has the phrase “‘any and all’ [ ] somehow become a banned phrase in Delaware search warrants.” State v. Chaffier, 2023 WL 1872284, at *4 (Del. Super. Ct. Jan. 17, 2023). “As with most questions of word usage, context is key. The phrase ‘any and all’—depending on what it is describing—is not only permissible, but sometimes necessary in a warrant.” Id. 72 Thomas, 2023 WL 6379829, at *14. 73 After both sides were given the opportunity, post-Thomas, to articulate any alternative overbreadth argument and any corresponding remedial excisions, Taylor and the State confirmed no such analysis was appropriate here. See Def.’s Post-Hearing Suppl.; State’s Resp. to Def.’s Post-Hearing Suppl. In other words, each party was content to stand or fall on their position that the Second Search Warrant was an impermissible general warrant or wholly appropriate as-is. Id. Those positions notwithstanding, during the proceedings on this motion, the Court has expressed its concern that there may be a discrete overbreadth fault with the Second Search Warrant. As explained in this section and the next, there undoubtedly was probable cause adequately expressed for the specific information and materials to be seized from the phone’s data that fell within the warrant’s defined time span. But the Court finds that there was overbreadth— 16 At the outset, the Second Search Warrant describes the two cellular devices as the specific place to be searched. Just as did the Thomas search warrant, the Second Search Warrant here does not authorize officers to search “any and all data” on Taylor’s phones. And unlike the First Search Warrant, the Second Search Warrant does not contain the troubling “including but not limited to” language. Rather it contains the term “to include” before setting forth what specific evidentiary items were sought from the devices: registry entries, pictures, photographs, images, audio/visual recordings, multi-media messages, web browsing activities, electronic documents, location information, text messaging, writings, usernames, subscriber identifiers, buddy names, screen names, calendar information, call logs, electronic mail, telephone numbers, any simi1ar information/data indicia of communication[]. Next, the Second Search Warrant, as in Thomas, has a temporal limitation that authorized officers to search for the identified evidentiary items dated from May 1, i.e., lack of sufficient particularity—in a discrete form of data that might be seized but for which that probable cause did not extend or that was not sufficiently explained and defined. Specifically, the data that would fall in the nebulous category of “electronic documents” would seem to trigger the redaction remedy called for by Thomas. See 2023 WL 6379829, at *15 (when a search warrant is overbroad “the proper remedy [i]s for the trial court to limit the Search Warrant only to that which was supported by probable cause”). The State has yet to satisfactorily describe what text- containing data would fall into that description— “electronic documents”—but not the others itemized. That so, it cannot be said that this inclusion allowed some “authorized unconstitutional exploratory rummaging” of the entirety of the phones. Id. at *14. So, the Court finds limiting the Second Search Warrant to exclude any information or material that was gathered only as “electronic documents” outside the scope of “multi-media messages . . . text messaging ... writings. . .electronic mail . . . [or] any similar information/data indicia of communication” or the other non-communication categories properly set forth in the warrant is appropriate. Id. at *12-13. The Court will, therefore, address any specific objection Taylor raises on a specific evidentiary item he contends falls within this exclusion. 17 2016, and June 1, 2016. As the Court in Thomas noted, the First Search Warrant in this case (as well as those in Wheeler and Buckham) had no such temporal limitation.74 Unlike in Thomas, however, Taylor’s phones were not known instruments of his alleged crimes—his phones had been found on his person in a search incident to Taylor’s arrest. As our high court again reminded, it does “not prescribe rigid rules for the drafting of search warrants.”75 In Buckham v. State, the Court held that the statement “criminals often communicate through cellular phones” was of little value for establishing probable cause to search a seized device. 76 But here, the State had more than just the general observation that communication aiding crimes happens via cell phone—there are social media postings deduced to be coming from Taylor. And the Second Search Warrant’s supporting affidavit lays out that Taylor’s use of social media and numerous postings referencing the recent crimes, along with his numerous posts referencing the ongoing gang feud, make it reasonable to conclude that he had used his phone(s) to communicate, plan, memorialize, or otherwise facilitate the communication about gang-related crimes among his cohorts. With that, the search warrant satisfies the particularity requirement. D. Evidence gathered via the Second Search Warrant is admissible under 74 Id. at *15 (citations omitted). 75 Id. 76 Buckham v. State, 185 A.3d 1, 17 (Del. 2018). 18 the Independent Source Doctrine. Taylor contends the Second Search Warrant serves “to wield the independent source doctrine to eviscerate the heightened privacy protections that blossomed in Riley and ultimately bloomed in Wheeler, Buckham, and Taylor.” 77 Our Supreme Court has held that “taint may be purged and the evidence may be admissible through one of the doctrinal exceptions to the exclusionary rule [including] the independent source doctrine . . . .” 78 As our Supreme Court has explained: [t]wo closely-related exceptions to the exclusionary rule flow from the premise that, although the government ought not profit from its own misconduct, it also should not be made worse off than it would have been had the misconduct not occurred . . . [] where the challenged evidence has an independent source, exclusion would put the police in a worse position than they would have been absent any error or violation. 79 The State insists that the Second Search Warrant is proper and the evidence seized under its authority admissible relying on Murray v. United States, where the United States Supreme Court—echoing its ruling in Nix v. Williams—observed that: [T]he interest of society in deterring unlawful police conduct and the public interest in having juries receive all probative evidence of a crime are properly balanced by putting the police in the same, not a worse position, that they would have been in if no police error or misconduct had occurred . . . . When the challenged evidence has an independent source, exclusion of such evidence would put the police in a worse position than they would have been in absent any error or 77 Def.’s Mot. to Suppress ¶ 23. 78 Lopez-Vazquez v. State, 956 A.2d 1280, 1292 (Del. 2008) (citations omitted). 79 Norman v. State, 976 A.2d 843, 859 (Del. 2009) (citations omitted). 19 violation.80 As the Third Circuit has since explained, when applying the Independent Source Doctrine, “the issue is whether the police would have applied for a warrant without the material tainted by a warrantless search.”81 Here, Taylor suggests that a Second Search Warrant remains tainted by the First Search Warrant and that this independently supports the suppression of the entirety of the contents of the phone. Not so. No doubt, the police applied for a search warrant in the first instant—it was simply the form of that warrant that was deficient. The State has since obtained a valid warrant that depends in no way on information gathered in what one would analogize as a first “warrantless” search. Under the Independent Search Doctrine, “officers who unlawfully enter an area protected by the Fourth Amendment and learn of facts x and y but then later learn of facts x and y independently and lawfully, can have admitted into evidence their knowledge concerning facts x and y.” 82 Taylor posits that the Colorado Supreme Court’s decision in People v. Thompson would prohibit application of the independent source doctrine here. 83 In 80 Murray v. United States, 487 U.S. 533, 537 (1988) (quoting Nix v. Williams, 467 U.S. 431, 443 (1984)). 81 United States v. Price, 558 F.3d 270, 282 (3d Cir. 2009). 82 United States v. Herrold, 962 F.2d 1131, 1140 (3d Cir. 1992). 83 Def.’s Mot. to Suppress ¶¶ 25-26 (citing People v. Thompson, 500 P.3d 1075 (Colo. 2021)). 20 Thompson the Colorado high court rightly held admissibility of evidence under a deficient warrant would not derive “simply by procuring a new warrant and ‘obtaining’ the evidence a second time (notwithstanding the fact that they had the evidence in their possession the entire time), without showing that the later seizure was genuinely independent of the earlier, tainted one.” 84 In affirming the trial court’s suppression order, the Thompson court did not hold that the independent source doctrine might not apply in such a circumstance.85 Rather, it found the “minimal argument of [prosecution] counsel did not satisfy the People’s burden of establishing the applicability of the independent source doctrine.” 86 Generally, the Independent Source Doctrine requires a determination of whether, “if, without regard to information obtained during the original entry, the police would have applied for the search warrant,” as well as whether “there was probable cause for the warrant to be issued.” 87 So first, has the State demonstrated that had the police not been privy to the contents of Taylor’s cell phones—through execution of First Search Warrant—they would have otherwise applied for a search warrant in the first instance? Of course, in circumstances like this, that answer is known. They did, in fact, apply for a 84 Thompson, 500 P.3d at 1080. 85 Id. at 1080-81. 86 Id. at 1080. 87 United States v. Price, 558 F.3d 270, 280 (3d Cir. 2009) (quoting Herrold, 962 F.2d at 1140). 21 warrant authorizing search of phones seized from Taylor’s person when he was arrested for these crimes. Next, was the probable cause articulated and extant for the Second Search Warrant independent of the initial, unlawful one? 88 It was. An arrest warrant had been issued for Taylor first-degree assault that stemmed for an alleged gang-related shooting that had occurred on May 16, 2016. The police, incident to arrest for that crime, gathered the two cell phones on Taylor’s person. Prior to searching those phones, police had discovered public social media evidence of the ongoing gang feud and that Taylor was actively posting photos and messages about that feud. In the affidavit to the Second Search Warrant, officers noted that “gangs are using social media to communicate within their own gang and with rival gang members. Threats and challenges are communicated in quick succession with resulting retaliatory criminal offenses happening soon thereafter.”89 The affidavit further described Taylor’s social media posts in detail:[] Taylor’s personal social media accounts have displayed “numerous photographs of [] Taylor holding or displaying firearms, photographs of [] Taylor and other gang members displaying gang signs, and [] Taylor and other gang members posting messages boasting about the STK gang, and also challenging rival gangs. Some of the social media posts use hashtags like “#FTO” ([sic] the Opps [opposition]) and 88 See Thompson, 500 P.3d at 1080. 89 Def.’s Mot. to Suppress, Ex. A ¶ 23. 22 “Dropping J’s” (a derogatory reference to Jordan Ellerbe being murdered). The volume of these postings and their presence on [] Taylor’s personal social media accounts is evidence that he frequently accessed and uploaded the content himself.90 The affidavit summarized that, “[b]y all accounts, it appears [] Taylor uses his cell phone(s) as a tool to perpetuate the ongoing violent gang warfare that is playing out over social media. Your affiant knows that the most convenient and popular mode of accessing and utilizing social media is a personal cell phone…[and] therefore believes that evidence of the ongoing gang feud and the recent shootings where [] Taylor is a suspect would be located on his cellular phones.”91 And “as highlighted in the attached exhibits, these individuals also use cellular phones to search the internet to view, download, and post to social media, news articles about crimes they have committed. . . .92 These public social media posts were available independent of the First Search Warrant. The Court recently addressed a circumstance similar to this in State v. Carter. 93 In Carter, the defendant moved to suppress alleging that the first-issued search warrant in his case was a general warrant because “it lacked specificity, the time period for which the materials were requested was too expansive, and [] it failed 90 Id. Ex. A ¶ 14. 91 Id. 92 Id. Ex. A ¶ 23. 93 State v. Carter, 2022 WL 1561537 (Del. Super. Ct. May 17, 2022). 23 to establish probable cause that any evidence of the alleged criminal activity would be found on the smartphone.”94 The officers subsequently obtained a second search warrant in response, and this Court held that under the Independent Source Doctrine, the second search warrant was proper and did not rely on the first search warrant.95 As the Court explained in Carter: None of the evidence obtained by way of Warrant 1 was used by the police in their application for Warrant 2. While this Court is cognizant of [the defendant’s] frustrations that the State, in essence, gets to fix its errors, suppression of all evidence retrieved from [the defendant’s] iPhone(s) does nothing to further the purposes of the exclusionary rule.96 The same conclusion is reached. The Independent Source Doctrine allows for admission of the evidence obtained from Taylor’s two smartphones under the Second Search Warrant. 94 Id. at *1. 95 Id. at *6. 96 Id. 24 E. The Law of the Case Doctrine does not bar the Second Search Warrant. Taylor maintains the Second Search Warrant and admission of any evidence obtained by its execution is barred by the Law of the Case Doctrine and the Mandate Rule. He construes the Supreme Court’s earlier ruling in his case to mean that “the Court unequivocally held that total suppression was the only remedy.” 97 Not so. When reversing and remanding for a new trial, the Supreme Court included no blanket prohibition on a second search warrant. Consistent with the Supreme Court’s remand instruction, a new trial has been afforded. Taylor’s contention that he “is to be retried barring all taint from the fruits of the first general search warrant”98 is being honored. As found above, there is no taint attached to the evidence the State now seeks to admit—it was all obtained via execution of the valid and constitutionally permissible Second Search Warrant. The State is correct here, “[i]f [it] were to ask th[is] [ ] Court to admit the same content from the same cell phone search warrant that [the] Supreme Court found unlawful, then the law of the case doctrine would prevent its use.”99 But, put simply, the law of this case was that the First Search Warrant was unconstitutionally deficient and therefore evidence obtained thereunder had to be excluded. There was no ruling that the same evidence 97 Def.’s Mot. to Suppress ¶ 17. 98 Id. ¶ 19. 99 State’s Resp. to Def.’s Mot. to Suppress ¶ 21. 25 was forever forbidden from use no matter the circumstance of its discovery. And there is nothing to be gained from exclusion of the evidence (whether it be the same or not) that has now been collected (or re-collected) in a constitutionally appropriate manner—i.e., under the authority granted by the Second Search Warrant. Neither the Law of the Case Doctrine nor the Mandate Rule require suppression in this instance. F. The Attorney General’s subpoena was valid. Taylor next argues that the subpoena served on the DDOC was unreasonable and, therefore, the materials produced must be excluded from use at his retrial.100 As noted, 29 Del. C. § 2504 sets forth the powers, duties and authority of the Department of Justice including the power to “investigate matters involving the public peace, safety and justice and to subpoena witnesses and evidence in connection therewith.” 101 Delaware has adopted the United States Supreme Court’s test first articulated in Procunier v. Martinez to assess the reasonableness of a subpoena for prison communications. 102 The Martinez standard requires Delaware courts to determine whether “(1) the contested actions furthered an important or 100 Def.’s Mot. to Suppress ¶¶ 36-46. 101 29 Del. C. § 2504(4). 102 Whitehurst v. State, 83 A.3d 362, 367 (Del. 2013) (citing Procunier v. Martinez, 416 U.S. 396, 423 (1974), rev’d on other grounds by Thornburgh v. Abbott, 490 U.S. 401 (1989). 26 substantial government interest . . . , and (2) the contested actions were no greater than necessary for the protection of that interest.”103 Furthermore, probable cause is not required for the State to record prisoners’ phone calls or to subpoena the recordings. This is because “prisoners who are notified by prison officials that their communications will be monitored have no expectation of privacy in the mail they send or the telephone calls they make” under the Fourth Amendment. 104 For such a subpoena to be found reasonable it must “specify the materials to be produced with reasonable particularity” and “require the production only of materials relevant to the investigation.”105 Finally, “the materials must not cover an unreasonable amount of time.”106 The State maintains that its subpoena for prison communications was appropriate because it stated with particularity the materials it was requesting, that those materials were relevant to its ongoing investigation, and that the timeframe for which prison communication materials was reasonable in this circumstance. 107 The Court agrees. 103 Id. (quoting Martinez, 416 U.S. at 423). 104 Id. (quoting Johnson v. State, 2012 WL 3893524, at *1 (Del. Sept. 7, 2012)). 105 Johnson v. State, 983 A.2d 904, 921 (Del. 2009). 106 Id. 107 State’s Resp. to Def.’s Mot. to Suppress ¶¶ 34, 36-37. 27 In Shannon Johnson v. State, the Supreme Court found sufficient particularity where the subpoena sought “…copies for all incoming and outgoing mail for inmate [] Johnson. . . from 11-15-2006.”108 Here, the subpoena does more. First, it states with particularity the materials to be produced, namely, phone number lists, outgoing call log entries and conversations, video calls, tablet text messages, in-person meeting recordings, and non-legal incoming and out-going material as it related to all records regarding telephone and/or visiting room conversations for Taylor.109 Second, the State provides several reasons why the materials requested are relevant to its case and ongoing investigative needs. In January 2020, Taylor was ordered to have No Contact with OMB or STK gang members, his co-defendants, and the victims or their residences.110 The State argues that “Taylor was convicted of chasing down and menacing at gunpoint two OMB-adjacent witnesses, victims [] and [], and shooting another victim [], who did not appear for trial. Taylor’s co- defendant [] was pending trial following Taylor’s guilty verdict, and Taylor’s co- defendant [] faced a series of threats following his testimony that led to his 108 Johnson, at 921. 109 State’s Resp. to Def.’s Mot. to Suppress ¶ 30. 110 State’s Resp. to Def.’s Mot. to Suppress ¶32. 28 relocation. . . for his safety.111 Additionally, the State presented information that Taylor was convicted of Assault in a Detention Facility during the pendency of his case, and that he has been using other inmate PINs for phone calls. 112 This behavior is consistent with inmate efforts to engage in ongoing criminal behavior while detained. Accordingly, the State has articulated a credible risk of witness intimidation and threats. And investigation of potential witness tampering constitutes a substantial government interest.113 Third, the materials sought covered the period between April 21, 2018, to the present. As we approach Taylor’s retrial, the credible risk of witness intimidation articulated by the State justified its request of DDOC. Taking these factors into consideration, there is nothing to indicate that the State’s subpoena was greater in scope than necessary to further its legitimate investigative efforts 114 and duties to prevent Taylor from engaging in criminal activity, as well as to protect the witnesses from tampering, threats, or intimidation. 111 Id. at ¶ 34. 112 State’s Resp. to Def.’s Mot. to Suppress ¶34. 113 Waters v. State, 242 A.3d 778, 784 (Del. 2020) (quoting Whitehurst, 83 A.3d at 367). 114 Whitehurst, 83 A.3d at 368. 29 VI. CONCLUSION For the foregoing reasons, Defendant’s Motion to Suppress is DENIED.115 IT IS SO ORDERED. /s/ Vivian L. Medinilla Vivian L. Medinilla Judge cc: Prothonotary 115 Albeit, without prejudice for Taylor to seek exclusion of any individual evidentiary item he contends was seized from his phones outside the limitation on the Second Search Warrant the Court described in n.75, supra. 30