IN THE SUPERIOR COURT OF THE STATE OF DELAWARE
STATE OF DELAWARE, )
)
)
v. ) I.D. Nos. 1605012921A
)
)
DIAMONTE TAYLOR, )
)
Defendant. )
MEMORANDUM OPINION
Submitted: November 2, 2023
Decided: November 28, 2023
Upon Consideration of Defendant’s Motion to Suppress,
DENIED.
William H. Leonard, Esquire, John S. Taylor, Esquire, and Isaac A. Rank, Esquire
Deputy Attorneys General, Department of Justice, Wilmington, Delaware.
Attorneys for the State.
Benjamin S. Gifford, IV, Esquire, The Law Office of Benjamin S. Gifford, IV,
Wilmington, Delaware, and John A. Barber, Esquire, The Law Office of John A.
Barber, Wilmington, Delaware. Attorneys for Defendant.
MEDINILLA, J.
I. INTRODUCTION
Defendant Diamonte Taylor was previously convicted of and sentenced to life
for first-degree murder and other gang-related crimes. On direct appeal, the
Delaware Supreme Court found that the search warrant used to obtain evidence from
his two smartphones was an unconstitutional general warrant, held that introduction
of that evidence was not harmless, reversed Taylor’s murder and related convictions,
and remanded the case for a new trial. In preparation for that new trial the State
obtained a second warrant to search and seize information from Taylor’s two phones.
Taylor is to be retried in the coming week. And he has now moved to suppress the
evidence gathered via that second warrant. Taylor has also moved to exclude
recordings of his communications from Department of Correction’s facilities that
were obtained via an Attorney General’s subpoena. The Court issued a ruling on
these requests several weeks ago. For the reasons stated below, Taylor’s Motion to
Suppress is DENIED.
II. FACTUAL AND PROCEDURAL BACKGROUND
Diamonte Taylor was arrested by the Wilmington Police Department and the
United States Marshals Service (“USMS”) on June 1, 2016, in relation to several
gang-related shootings in May of 2016.1 He was subsequently indicted for Murder
1
State’s Response to Defendant’s Motion to Suppress ¶ 1 (D.I. 163) (hereinafter, “State’s Resp.
to Def.’s Mot. to Suppress”).
2
in the First Degree, Gang Participation, Conspiracy in the First Degree, and multiple
other violent felonies alleged to have taken place between January 23, 2015, and
June 1, 2016.2
When Taylor was arrested, USMS found two smartphones on him.3 Law
enforcement applied for a warrant to search those two phones (“First Search
Warrant”).4 In his supporting affidavit, the applicant officer described the gang-
related shootings and the personal connections amongst the gang members.5 On
June 16, 2016, the First Search Warrant was approved by the Justice of the Peace
Court and granted permission to search for and seize:
any/all data stored by whatever means, or through normal course of
business of wireless services, and/or through the forensic
examination of said cellular telephone, to include but not limited to
registry entries, pictures, photographs, images, audio/visual
recordings, multi-media messages, web browsing activities,
electronic documents, location information, text messaging,
writings, user names, subscriber identifiers, buddy names, screen
names, calendar information, call logs, electronic mail, telephone
numbers, any similar information/data indicia of communication,
and any other information/data pertinent to this investigation within
said scope.6
Before his first trial, Taylor filed a motion to suppress all evidence from the
2
Defendant’s Motion to Suppress ¶ 1 (D.I. 162) (hereinafter, “Def.’s Mot. to Suppress”).
3
State’s Resp. to Def.’s Mot. to Suppress ¶ 1.
4
Taylor v. State, 260 A.3d 602, 609 (Del. 2021).
5
Id.
6
Id. (emphasis added).
3
two phones, arguing that the First Search Warrant was an unconstitutional general
warrant. 7 This Court denied the motion. 8 A jury convicted Taylor of Murder in the
First Degree, Gang Participation, Assault First Degree, two counts of Reckless
Endangering First Degree, two counts of Aggravated Menacing, and numerous
related firearm offenses. 9 He was sentenced to, inter alia, a mandatory life sentence
for the first-degree murder count.10
Taylor filed a direct appeal. 11 In September 2021, the Delaware Supreme
Court issued its decision reversing this Court’s judgment on the suppression issue,
vacating Taylor’s convictions, and remanding the matter for a new trial.12 The
Supreme Court held that the First Search Warrant was an unconstitutional general
warrant that lacked the requisite particularity and “allowed investigators to conduct
an unconstitutional rummaging through all of the contents of Taylor's smartphones
to find whatever they decided might be of interest to their investigation.”13
With the matter now set for retrial, the State, on January 4, 2022, applied for
and was granted a second search warrant (“Second Search Warrant”) allowing
7
D.I. 53.
8
D.I. 61.
9
D.I. 77.
10
D.I. 105.
11
Notice of Appeal filed on March 2, 2020 (D.I. 106).
12
Taylor, 260 A.3d at 619.
13
Id. at 615.
4
search of the same two phones. 14 The Second Search Warrant, approved by a
Superior Court judge with knowledge of the Supreme Court’s ruling, authorized
seizure of:
data stored through normal course of business of wireless services,
and/or through the forensic examination of said cellular telephone,
to include registry entries, pictures, photographs, images,
audio/visual recordings, multi-media messages, web browsing
activities, electronic documents, location information, text
messaging, writings, user names, subscriber identifiers, buddy
names, screen names, calendar information, call logs, electronic
mail, telephone numbers, any similar information/data indicia of
communication, within the time frame of May 1, 2016 to June 1,
2016. 15
The affidavit to the Second Search Warrant explained that Taylor maintained public
social media accounts where he posted photographs depicting gang members
displaying gang signs via hand gestures. 16 Other photographs on those accounts
included Taylor holding or displaying firearms. 17 The affidavit concluded that
“the most convenient and popular mode of accessing and utilizing social media is a
personal cellular phone. . . . therefore, [] evidence of the ongoing gang feud and the
recent shootings where [Taylor] is a suspect would be located on his cellular
phones.” 18 Finally, there was a specific averment that the Second Search Warrant’s
14
Def.’s Mot. to Suppress ¶ 7.
15
Def.’s Mot. to Suppress, Ex. A.
16
Id. Ex. A ¶ 14.
17
Id.
18
Id.
5
affidavit did “not contain any evidence that was obtained after the initial June 10,
2016, warrant application or from evidence obtained from the download of the
cellular devices at issue.”19
Several months later, while investigating and preparing for the second trial,
the Department of Justice served a subpoena duces tecum on the Delaware
Department of Corrections (“DDOC”).20 This subpoena commanded the DDOC
provide:
[A]ll records regarding telephone and/or visiting room
conversations for [Taylor] including, but not limited to any and all
available approved phone number lists, GTL outgoing call log
entries and conversations; video calls; tablet text messages; in-
person meeting recordings; non-legal incoming and outgoing mail
for the time period of April 21, 2018 through the present to be
updated on a weekly basis until further notice.21
The State provided defense counsel with the materials obtained under this
subpoena.22
Taylor filed a Motion to Suppress the evidence obtained from his two phones
in its entirety as well as the evidence obtained from the DDOC via the later
subpoena.23 The State filed a written response.24 And the parties docketed post-
19
Id. Ex. A ¶ 25.
20
Def.’s Mot. to Suppress, Ex. B.
21
Id.
22
Def.’s Mot. to Suppress ¶ 10.
23
See Def.’s Mot. to Suppress.
24
See State’s Resp. to Def.’s Mot. to Suppress.
6
hearing supplements on June 30, 2023. 25
While the matter was pending decision, the Court asked the parties to address
the Delaware Supreme Court’s recent ruling in Thomas v. State.26 Both parties filed
written supplements. 27 The Court then heard oral arguments during a conference
conducted earlier this month.28 The next week, the Court notified parties of its
decision to deny the Motion to Suppress with a written explanation of that ruling to
follow.29 Taylor’s re-trial is scheduled to begin on December 4, 2023.30
III. PARTIES’ CONTENTIONS
Taylor argues four grounds for suppression of the evidence he seeks to
exclude.31 First, he contends that the Second Search Warrant is barred by the Law
of the Case Doctrine and the Mandate Rule. 32 In Taylor’s view, the plain language
of the Supreme Court’s decision striking the First Search Warrant requires
25
Defendant’s Post-Hearing Supplement (D.I. 167) (hereinafter, “Def.’s Post-Hearing Suppl.”);
State’s Response to Defendant’s Post-Hearing Supplement (D.I. 169) (hereinafter, “State’s Resp.
to Def.’s Post-Hearing Suppl.”).
26
Court’s Letter dated 10-25-2023 (D.I. 176) (hereinafter, “Ct.’s Letter dated 10-25-2023”).
27
Defendant’s Response to Court’s Letter dated 10-25-2023 (D.I. 177) (hereinafter, “Def.’s
Resp. to Ct.’s Letter dated 10-25-2023”); State’s Response to Court’s Letter dated 10-25-2023
(D.I. 178) (hereinafter, “State’s Resp. to Ct.’s Letter dated 10-25-2023”).
28
Status Conference dated 11-02-2023 (D.I. 180) (hereinafter, “Status Conference dated 11-02-
2023”).
29
Court’s Letter dated 11-09-2023 (D.I. 181) (hereinafter, “Ct.’s Letter dated 11-09-2023”).
30
Status Conference dated 11-02-2023.
31
See Def.’s Mot. to Suppress.
32
Def.’s Mot. to Suppress ¶¶ 12-19.
7
suppression of the evidence gathered through execution of the Second Search
Warrant. To Taylor, “[t]he Supreme Court’s mandate could not be clearer: [Taylor]
is to be retried barring all taint from the fruits of the first general search warrant.”33
Second, Taylor says that application of the Independent Source Doctrine is improper
and contrary to the search and seizure jurisprudence regarding electronic devices.34
Specifically, that “[w]ith the Second Warrant, the State seeks to wield the
independent source doctrine to eviscerate the heightened privacy protections that
blossomed in Riley and ultimately bloomed in Wheeler, Buckham, and Taylor.”35
Third, Taylor argues that the Second Search Warrant again fails the particularity
requirement.36 Taylor posits that simply removing the terms “any/all” from the
beginning of the search warrant is just an illusory change; the Second Search
Warrant has remained substantively the same. 37 Fourth, Taylor complains that the
subpoena served by the State on the DDOC was unreasonable and any evidence
obtained under it should be excluded.38
In response, the State first insists that the Second Search Warrant passes
33
Id. ¶ 19.
34
Id. ¶¶ 20-29.
35
Id. ¶ 23.
36
Id. ¶¶ 30-35.
37
Id. ¶¶ 33-34.
38
Def.’s Mot. to Suppress ¶¶ 36-46.
8
constitutional muster under the Independent Source Doctrine. 39 Second, that the
Second Search Warrant satisfies the particularity requirement and “within its four
corners, contains profound evidence of criminality.” 40 Third, that the Law of the
Case Doctrine and the Mandate Rule are inapplicable because the Supreme Court’s
earlier decision focused on the defective form of the First Search Warrant, and did
not prohibit a second warrant attempt. 41 Fourth, the State contends that the subpoena
to DDOC was proper, 42 and that the scope of the communications sought was
reasonable.43
IV. APPLICABLE LEGAL STANDARDS
A. Search Warrants
Eleven Del. C. § 2306 governs the issuance of search warrants and ensures
compliance with the United States and Delaware Constitutions. In relevant part,
Delaware search warrants must:
[D]esignate the house, place, conveyance or person to be searched
and the owner or occupant thereof (if any), and shall describe the
things or persons sought as particularly as may be, and shall
substantially allege the cause for which the search is made or the
offense committed by or in relation to the persons or things searched
for, and shall state that the complainant suspects that such persons
or things are concealed in the house, place, conveyance or person
39
State’s Resp. to Def.’s Mot. to Suppress ¶¶ 9-17.
40
Id. ¶¶ 18-20.
41
Id. ¶¶ 21-23.
42
Id. ¶¶ 24-35.
43
Id. ¶¶ 36-38.
9
designated and shall recite the facts upon which such suspicion is
founded. 44
Our Supreme Court has instructed that a finding of probable cause “must be based
on the information that appears within the four corners of the application or
affidavit.”45 And that a judge may find probable cause “when, considering the
totality of the circumstances, ‘there is a fair probability that contraband or evidence
of a crime will be found in a particular place.’”46 This Court’s Criminal Rule 41
requires that a motion to suppress “. . . state the grounds upon which it is made with
sufficient specificity to give the state reasonable notice of the issues and to enable
the court to determine what proceedings are appropriate to address them.”47
In recent years, our Supreme Court has recognized the constitutional
challenges unique to search warrants issued for electronic devices and has explained
“that a warrant—no matter its target—must both ‘describe the things to be searched
with sufficient particularity and be no broader than the probable cause on which it
44
11 Del. C. § 2306.
45
Anderson v. State, 249 A.3d 785, 795 (Del. 2021) (citing Valentine v. State, 207 A.3d 566,
570 (Del. 2019)).
46
Sisson v. State, 903 A.2d 288, 296 (Del. 2006) (citing Stones v. State, 676 A.2d 907 (Del.
1996)).
47
Super. Ct. Crim. R. 41(f) (The court shall receive evidence on any issue of fact necessary to
the decision of the motion, but the court shall not receive evidence on motions challenging the
manner of execution of a search warrant or the veracity of a sworn statement used to procure a
search warrant unless the motions are supported by affidavits, or their absence is satisfactorily
explained in the motion, and the allegedly false statement is necessary to the finding of probable
cause.)
10
is based.’”48 The Court has also cautioned that because of the volume of sensitive
information stored on a smartphone, searches should be as limited as possible to
avoid “exploratory rummaging” in a person’s other irrelevant information and
belongings.49
B. Attorney General Subpoenas
Twenty-nine Del. C. § 2504 sets forth the powers, duties and authority of the
Department of Justice including the power to “investigate matters involving the
public peace, safety and justice and to subpoena witnesses and evidence in
connection therewith.” 50
V. DISCUSSION
The Fourth Amendment to the United States Constitution guarantees:
[t]he right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be seized.51
The Fourth Amendment functions “to safeguard the privacy and security of
individuals against arbitrary invasions by governmental officials.”52 The United
48
Buckham v. State, 185 A.3d 1, 18 (Del. 2018) (citing Wheeler v. State, 135 A.3d 282, 299
(Del. 2016)) (emphasis added).
49
Buckham, 185 A.3d at 18 (citing Wheeler, 135 A.3d at 298).
50
29 Del. C. § 2504(4).
51
U.S. CONST. amend. IV.
52
Camara v. Mun. Court of City & Cnty. of San Francisco, 387 U.S. 523, 528 (1967).
11
States Supreme Court has made clear that search warrants are not mere formalities
but serve a critical function.53
Absent some grave emergency, the Fourth Amendment has
interposed a magistrate between the citizen and the police . . . . The
right of privacy was deemed too precious to entrust to the discretion
of those whose job is the detection of crime and the arrest of
criminals. Power is a heady thing; and history shows that the police
acting on their own cannot be trusted. And so the Constitution
requires a magistrate to pass on the desires of the police . . . . 54
The Fourth Amendment prohibits general warrants that allow “exploratory
rummaging in a person’s belongings,” and addresses this problem by requiring a
‘particular description’ of the things to be seized.55 In order for a search warrant to
be deemed constitutional, it must conform to this particularity requirement.56 And
“[t]he Fourth Amendment by its terms requires particularity in the warrant, not in
the supporting documents.”57
Article I § 6 of the Delaware State Constitution provides a similar
guarantee that:
The people shall be secure in their persons, houses, papers and
possessions, from unreasonable searches and seizures; and no
warrant to search any place, or to seize any person or thing, shall
53
McDonald v. United States, 335 U.S. 451, 455 (1948).
54
McDonald, 335 U.S. at 455–56.
55
Andresen v. Maryland, 427 U.S. 463, 480 (1976) (quoting Coolidge v. New Hampshire, 403
U.S. 443, 467 (1971)).
56
Groh v. Ramirez, 540 U.S. 551, 559 (2004) (citing Stanford v. Texas, 379 U.S. 476 (1965)).
57
Groh, 540 U.S. at 557 (citing Massachusetts v. Sheppard, 468 U.S. 981, 988 n.5 (1984)).
12
issue without describing them as particularly as may be; nor then,
unless there be probable cause supported by oath or affirmation.58
A. Delaware law requires as much specificity as possible in search warrants
pertaining to electronic devices.
In Wheeler v. State, our Supreme Court considered, for the first time, “a
challenge to warrants seeking to seize and search computer-based and digital items
on the grounds that they are in the nature of a general warrant, unconstitutionally
overbroad, and lack sufficient particularity.” 59 Coming after the seminal decision in
Riley v. California, where the United States Supreme Court held that a warrant is
generally required before searching a cell phone “even when a cell phone is seized
incident to arrest,”60 Wheeler reiterated that to satisfy the particularity requirement,
warrants “must describe what investigating officers believe will be found on
electronic devices with as much specificity as possible under the circumstances.”61
The Court in Wheeler addressed the balance of interests between protecting a
citizen’s right to privacy and the police powers of the state.62 Importantly, for
58
DEL. CONST., art. I, § 6.
59
Wheeler v. State, 135 A.3d 282, 302 (Del. 2016).
60
Riley v. California, 573 U.S. 373, 401 (2014).
61
Wheeler, 135 A.3d at 304.
62
Id. at 305 (citations omitted) (“We hesitate to prescribe rigid rules and instead reiterate that
warrants must designate the things to be searched and seized as particularly as possible. Striking
the correct balance when protecting against generality and overbreadth requires vigilance on the
part of judicial officers who are on the front lines of preserving constitutional rights while assisting
government officials in the legitimate pursuit of prosecuting criminal activity. Where, as here, the
investigators had available to them a more precise description of the alleged criminal activity that
is the subject of the warrant, such information should be included in the instrument and the search
13
warrants executed on electronic devices in the post-Riley context, our Supreme Court
has noted that “[s]atisfying the particularity requirement is difficult in the electronic
search warrant context, given the commingling of relevant and irrelevant
information and the complexities of segregating responsive files ex ante.” 63 Our
Supreme Court revisited the particularity requirement in Buckham v. State, finding
that the search warrant there was unconstitutional as it had “expressly authorized
search of materials there was no probable cause to search . . . .” 64
B. In Taylor v. State, the First Search Warrant was found to be a general
warrant.
As our Supreme Court noted in Wheeler, because reviewing courts consider
both a search warrant’s validity and whether it was properly executed only after the
search is completed, courts must contend with the commingling of relevant and
irrelevant information while separating files before the search is even conducted. 65
In this case, our Supreme Court held that the First Search Warrant was a
general warrant because it allowed “investigators to search for ‘any and all data’
and seizure should be appropriately narrowed to the relevant time period so as to mitigate the
potential for unconstitutional exploratory rummaging.”)
63
Id. at 299–300.
64
Buckham v. State, 185 A.3d 1, 19 (Del. 2018).
65
See Adam M. Gershowitz, The Post-Riley Search Warrant: Search Protocols and Particularity
in Cell Phone Searches, 69 Vand. L. Rev. 585 (2016) (suggesting that judicial officers should pre-
emptively impose restrictions on cell phone search warrants at the time the warrants are issued.)
14
‘pertinent to the criminal investigation’ [and was] unlimited in scope.”66 The Court
further noted that when executing the First Search Warrant, “investigators
apparently extracted almost all data from Taylor’s smartphones from an eleven-year
time span, and then searched without restriction for evidence of criminal conduct.”67
This Court must now address whether the substance and form of the Second
Search Warrant has sufficiently overcome the constitutional defects of the First
Search Warrant. The Court finds that it does.
C. The Second Search Warrant is not a general warrant.
Through Wheeler, Buckham, Taylor, and most recently, Thomas v. State, our
Supreme Court has established that a warrant that allows an unbridled “‘top-to-
bottom search’ of ‘[a]ny and all store[d] data’” on such devices is constitutionally
infirm.68 In Thomas, our Supreme Court instructed that “if a court determines that a
warrant is general, it must suppress all evidence obtained pursuant to it.”69 But in
the instance of an overly broad warrant, the reviewing Court may narrow it down
“to strike out those portions of the warrant that are invalid for lack of probable cause,
maintaining the remainder of the warrant that satisfies the Fourth Amendment.”70
66
Taylor v. State, 260 A.3d 602, 616 (Del. 2021).
67
Id.
68
Thomas v. State, __ A.3d __, 2023 WL 6379829, at *10-13 (Del. Oct. 2, 2023).
69
Id. at *13.
70
Id. (quoting Taylor, 260 A.3d at 617).
15
This Court now examines the four corners of the Second Search Warrant. The
Second Search Warrant not only removed the any/all language that afflicted the First
Search Warrant—it also imposed an additional temporal restriction on the data
searched and seized to include only information from May 1, 2016 to June 1, 2016.
The removal of the “any and all language” is not necessarily a cure-all—“the fact
that the warrant does not use the language ‘any and all’ puts form over substance.”71
This Court now finds that these changes, taken together, did impose a meaningful
restriction on the data the State searched and seized from Taylor’s mobile devices.
The recent decision in Thomas v. State guides the Court’s particularity review.
In Thomas, our Supreme Court held that this Court had appropriately redacted
evidence from the issued search warrant to eliminate the sections that were lacking
probable cause. 72 If needed, the same could be done here.73
71
State v. Freeman, 2023 WL 2854771, at *6 (Del. Super. Ct. Apr. 9, 2023). Nor has the
phrase “‘any and all’ [ ] somehow become a banned phrase in Delaware search warrants.” State v.
Chaffier, 2023 WL 1872284, at *4 (Del. Super. Ct. Jan. 17, 2023). “As with most questions of
word usage, context is key. The phrase ‘any and all’—depending on what it is describing—is not
only permissible, but sometimes necessary in a warrant.” Id.
72
Thomas, 2023 WL 6379829, at *14.
73
After both sides were given the opportunity, post-Thomas, to articulate any alternative
overbreadth argument and any corresponding remedial excisions, Taylor and the State confirmed
no such analysis was appropriate here. See Def.’s Post-Hearing Suppl.; State’s Resp. to Def.’s
Post-Hearing Suppl. In other words, each party was content to stand or fall on their position that
the Second Search Warrant was an impermissible general warrant or wholly appropriate as-is. Id.
Those positions notwithstanding, during the proceedings on this motion, the Court has
expressed its concern that there may be a discrete overbreadth fault with the Second Search
Warrant. As explained in this section and the next, there undoubtedly was probable cause
adequately expressed for the specific information and materials to be seized from the phone’s data
that fell within the warrant’s defined time span. But the Court finds that there was overbreadth—
16
At the outset, the Second Search Warrant describes the two cellular devices
as the specific place to be searched. Just as did the Thomas search warrant, the
Second Search Warrant here does not authorize officers to search “any and all data”
on Taylor’s phones. And unlike the First Search Warrant, the Second Search
Warrant does not contain the troubling “including but not limited to” language.
Rather it contains the term “to include” before setting forth what specific evidentiary
items were sought from the devices:
registry entries, pictures, photographs, images, audio/visual
recordings, multi-media messages, web browsing activities,
electronic documents, location information, text messaging,
writings, usernames, subscriber identifiers, buddy names, screen
names, calendar information, call logs, electronic mail, telephone
numbers, any simi1ar information/data indicia of communication[].
Next, the Second Search Warrant, as in Thomas, has a temporal limitation that
authorized officers to search for the identified evidentiary items dated from May 1,
i.e., lack of sufficient particularity—in a discrete form of data that might be seized but for which
that probable cause did not extend or that was not sufficiently explained and defined. Specifically,
the data that would fall in the nebulous category of “electronic documents” would seem to trigger
the redaction remedy called for by Thomas. See 2023 WL 6379829, at *15 (when a search warrant
is overbroad “the proper remedy [i]s for the trial court to limit the Search Warrant only to that
which was supported by probable cause”). The State has yet to satisfactorily describe what text-
containing data would fall into that description— “electronic documents”—but not the others
itemized. That so, it cannot be said that this inclusion allowed some “authorized unconstitutional
exploratory rummaging” of the entirety of the phones. Id. at *14. So, the Court finds limiting the
Second Search Warrant to exclude any information or material that was gathered only as
“electronic documents” outside the scope of “multi-media messages . . . text messaging ...
writings. . .electronic mail . . . [or] any similar information/data indicia of communication” or the
other non-communication categories properly set forth in the warrant is appropriate. Id. at *12-13.
The Court will, therefore, address any specific objection Taylor raises on a specific evidentiary
item he contends falls within this exclusion.
17
2016, and June 1, 2016. As the Court in Thomas noted, the First Search Warrant in
this case (as well as those in Wheeler and Buckham) had no such temporal
limitation.74 Unlike in Thomas, however, Taylor’s phones were not known
instruments of his alleged crimes—his phones had been found on his person in a
search incident to Taylor’s arrest. As our high court again reminded, it does “not
prescribe rigid rules for the drafting of search warrants.”75
In Buckham v. State, the Court held that the statement “criminals often
communicate through cellular phones” was of little value for establishing probable
cause to search a seized device. 76 But here, the State had more than just the general
observation that communication aiding crimes happens via cell phone—there are
social media postings deduced to be coming from Taylor. And the Second Search
Warrant’s supporting affidavit lays out that Taylor’s use of social media and
numerous postings referencing the recent crimes, along with his numerous posts
referencing the ongoing gang feud, make it reasonable to conclude that he had used
his phone(s) to communicate, plan, memorialize, or otherwise facilitate the
communication about gang-related crimes among his cohorts. With that, the search
warrant satisfies the particularity requirement.
D. Evidence gathered via the Second Search Warrant is admissible under
74
Id. at *15 (citations omitted).
75
Id.
76
Buckham v. State, 185 A.3d 1, 17 (Del. 2018).
18
the Independent Source Doctrine.
Taylor contends the Second Search Warrant serves “to wield the independent
source doctrine to eviscerate the heightened privacy protections that blossomed in
Riley and ultimately bloomed in Wheeler, Buckham, and Taylor.” 77 Our Supreme
Court has held that “taint may be purged and the evidence may be admissible through
one of the doctrinal exceptions to the exclusionary rule [including] the independent
source doctrine . . . .” 78 As our Supreme Court has explained:
[t]wo closely-related exceptions to the exclusionary rule flow from
the premise that, although the government ought not profit from its
own misconduct, it also should not be made worse off than it would
have been had the misconduct not occurred . . . [] where the
challenged evidence has an independent source, exclusion would
put the police in a worse position than they would have been absent
any error or violation. 79
The State insists that the Second Search Warrant is proper and the evidence
seized under its authority admissible relying on Murray v. United States, where the
United States Supreme Court—echoing its ruling in Nix v. Williams—observed that:
[T]he interest of society in deterring unlawful police conduct and
the public interest in having juries receive all probative evidence of
a crime are properly balanced by putting the police in the same, not
a worse position, that they would have been in if no police error or
misconduct had occurred . . . . When the challenged evidence has an
independent source, exclusion of such evidence would put the police
in a worse position than they would have been in absent any error or
77
Def.’s Mot. to Suppress ¶ 23.
78
Lopez-Vazquez v. State, 956 A.2d 1280, 1292 (Del. 2008) (citations omitted).
79
Norman v. State, 976 A.2d 843, 859 (Del. 2009) (citations omitted).
19
violation.80
As the Third Circuit has since explained, when applying the Independent
Source Doctrine, “the issue is whether the police would have applied for a warrant
without the material tainted by a warrantless search.”81 Here, Taylor suggests that a
Second Search Warrant remains tainted by the First Search Warrant and that this
independently supports the suppression of the entirety of the contents of the phone.
Not so.
No doubt, the police applied for a search warrant in the first instant—it was
simply the form of that warrant that was deficient. The State has since obtained a
valid warrant that depends in no way on information gathered in what one would
analogize as a first “warrantless” search. Under the Independent Search Doctrine,
“officers who unlawfully enter an area protected by the Fourth Amendment and learn
of facts x and y but then later learn of facts x and y independently and lawfully, can
have admitted into evidence their knowledge concerning facts x and y.” 82
Taylor posits that the Colorado Supreme Court’s decision in People v.
Thompson would prohibit application of the independent source doctrine here. 83 In
80
Murray v. United States, 487 U.S. 533, 537 (1988) (quoting Nix v. Williams, 467 U.S. 431,
443 (1984)).
81
United States v. Price, 558 F.3d 270, 282 (3d Cir. 2009).
82
United States v. Herrold, 962 F.2d 1131, 1140 (3d Cir. 1992).
83
Def.’s Mot. to Suppress ¶¶ 25-26 (citing People v. Thompson, 500 P.3d 1075 (Colo. 2021)).
20
Thompson the Colorado high court rightly held admissibility of evidence under a
deficient warrant would not derive “simply by procuring a new warrant and
‘obtaining’ the evidence a second time (notwithstanding the fact that they had the
evidence in their possession the entire time), without showing that the later seizure
was genuinely independent of the earlier, tainted one.” 84 In affirming the trial
court’s suppression order, the Thompson court did not hold that the independent
source doctrine might not apply in such a circumstance.85 Rather, it found the
“minimal argument of [prosecution] counsel did not satisfy the People’s burden of
establishing the applicability of the independent source doctrine.” 86
Generally, the Independent Source Doctrine requires a determination of
whether, “if, without regard to information obtained during the original entry, the
police would have applied for the search warrant,” as well as whether “there was
probable cause for the warrant to be issued.” 87
So first, has the State demonstrated that had the police not been privy to the
contents of Taylor’s cell phones—through execution of First Search Warrant—they
would have otherwise applied for a search warrant in the first instance? Of course,
in circumstances like this, that answer is known. They did, in fact, apply for a
84
Thompson, 500 P.3d at 1080.
85
Id. at 1080-81.
86
Id. at 1080.
87
United States v. Price, 558 F.3d 270, 280 (3d Cir. 2009) (quoting Herrold, 962 F.2d at 1140).
21
warrant authorizing search of phones seized from Taylor’s person when he was
arrested for these crimes.
Next, was the probable cause articulated and extant for the Second Search
Warrant independent of the initial, unlawful one? 88 It was. An arrest warrant had
been issued for Taylor first-degree assault that stemmed for an alleged gang-related
shooting that had occurred on May 16, 2016. The police, incident to arrest for that
crime, gathered the two cell phones on Taylor’s person. Prior to searching those
phones, police had discovered public social media evidence of the ongoing gang
feud and that Taylor was actively posting photos and messages about that feud. In
the affidavit to the Second Search Warrant, officers noted that “gangs are using
social media to communicate within their own gang and with rival gang members.
Threats and challenges are communicated in quick succession with resulting
retaliatory criminal offenses happening soon thereafter.”89
The affidavit further described Taylor’s social media posts in detail:[]
Taylor’s personal social media accounts have displayed “numerous
photographs of [] Taylor holding or displaying firearms, photographs
of [] Taylor and other gang members displaying gang signs, and []
Taylor and other gang members posting messages boasting about the
STK gang, and also challenging rival gangs. Some of the social media
posts use hashtags like “#FTO” ([sic] the Opps [opposition]) and
88
See Thompson, 500 P.3d at 1080.
89
Def.’s Mot. to Suppress, Ex. A ¶ 23.
22
“Dropping J’s” (a derogatory reference to Jordan Ellerbe being
murdered). The volume of these postings and their presence on []
Taylor’s personal social media accounts is evidence that he frequently
accessed and uploaded the content himself.90
The affidavit summarized that, “[b]y all accounts, it appears [] Taylor uses his
cell phone(s) as a tool to perpetuate the ongoing violent gang warfare that is playing
out over social media. Your affiant knows that the most convenient and popular
mode of accessing and utilizing social media is a personal cell phone…[and]
therefore believes that evidence of the ongoing gang feud and the recent shootings
where [] Taylor is a suspect would be located on his cellular phones.”91 And “as
highlighted in the attached exhibits, these individuals also use cellular phones to
search the internet to view, download, and post to social media, news articles about
crimes they have committed. . . .92 These public social media posts were available
independent of the First Search Warrant.
The Court recently addressed a circumstance similar to this in State v.
Carter. 93 In Carter, the defendant moved to suppress alleging that the first-issued
search warrant in his case was a general warrant because “it lacked specificity, the
time period for which the materials were requested was too expansive, and [] it failed
90
Id. Ex. A ¶ 14.
91
Id.
92
Id. Ex. A ¶ 23.
93
State v. Carter, 2022 WL 1561537 (Del. Super. Ct. May 17, 2022).
23
to establish probable cause that any evidence of the alleged criminal activity would
be found on the smartphone.”94 The officers subsequently obtained a second search
warrant in response, and this Court held that under the Independent Source Doctrine,
the second search warrant was proper and did not rely on the first search warrant.95
As the Court explained in Carter:
None of the evidence obtained by way of Warrant 1 was used by the
police in their application for Warrant 2. While this Court is
cognizant of [the defendant’s] frustrations that the State, in essence,
gets to fix its errors, suppression of all evidence retrieved from [the
defendant’s] iPhone(s) does nothing to further the purposes of the
exclusionary rule.96
The same conclusion is reached. The Independent Source Doctrine allows for
admission of the evidence obtained from Taylor’s two smartphones under the
Second Search Warrant.
94
Id. at *1.
95
Id. at *6.
96
Id.
24
E. The Law of the Case Doctrine does not bar the Second Search Warrant.
Taylor maintains the Second Search Warrant and admission of any evidence
obtained by its execution is barred by the Law of the Case Doctrine and the Mandate
Rule. He construes the Supreme Court’s earlier ruling in his case to mean that “the
Court unequivocally held that total suppression was the only remedy.” 97 Not so.
When reversing and remanding for a new trial, the Supreme Court included
no blanket prohibition on a second search warrant. Consistent with the Supreme
Court’s remand instruction, a new trial has been afforded. Taylor’s contention that
he “is to be retried barring all taint from the fruits of the first general search
warrant”98 is being honored. As found above, there is no taint attached to the
evidence the State now seeks to admit—it was all obtained via execution of the valid
and constitutionally permissible Second Search Warrant. The State is correct here,
“[i]f [it] were to ask th[is] [ ] Court to admit the same content from the same cell
phone search warrant that [the] Supreme Court found unlawful, then the law of the
case doctrine would prevent its use.”99 But, put simply, the law of this case was that
the First Search Warrant was unconstitutionally deficient and therefore evidence
obtained thereunder had to be excluded. There was no ruling that the same evidence
97
Def.’s Mot. to Suppress ¶ 17.
98
Id. ¶ 19.
99
State’s Resp. to Def.’s Mot. to Suppress ¶ 21.
25
was forever forbidden from use no matter the circumstance of its discovery. And
there is nothing to be gained from exclusion of the evidence (whether it be the same
or not) that has now been collected (or re-collected) in a constitutionally appropriate
manner—i.e., under the authority granted by the Second Search Warrant. Neither
the Law of the Case Doctrine nor the Mandate Rule require suppression in this
instance.
F. The Attorney General’s subpoena was valid.
Taylor next argues that the subpoena served on the DDOC was unreasonable
and, therefore, the materials produced must be excluded from use at his retrial.100
As noted, 29 Del. C. § 2504 sets forth the powers, duties and authority of the
Department of Justice including the power to “investigate matters involving the
public peace, safety and justice and to subpoena witnesses and evidence in
connection therewith.” 101
Delaware has adopted the United States Supreme Court’s test first articulated
in Procunier v. Martinez to assess the reasonableness of a subpoena for prison
communications. 102
The Martinez standard requires Delaware courts to determine
whether “(1) the contested actions furthered an important or
100
Def.’s Mot. to Suppress ¶¶ 36-46.
101
29 Del. C. § 2504(4).
102
Whitehurst v. State, 83 A.3d 362, 367 (Del. 2013) (citing Procunier v. Martinez, 416 U.S.
396, 423 (1974), rev’d on other grounds by Thornburgh v. Abbott, 490 U.S. 401 (1989).
26
substantial government interest . . . , and (2) the contested actions
were no greater than necessary for the protection of that interest.”103
Furthermore,
probable cause is not required for the State to record prisoners’
phone calls or to subpoena the recordings. This is because
“prisoners who are notified by prison officials that their
communications will be monitored have no expectation of privacy
in the mail they send or the telephone calls they make” under the
Fourth Amendment. 104
For such a subpoena to be found reasonable it must “specify the materials to
be produced with reasonable particularity” and “require the production only of
materials relevant to the investigation.”105 Finally, “the materials must not cover an
unreasonable amount of time.”106
The State maintains that its subpoena for prison communications was
appropriate because it stated with particularity the materials it was requesting, that
those materials were relevant to its ongoing investigation, and that the timeframe for
which prison communication materials was reasonable in this circumstance. 107 The
Court agrees.
103
Id. (quoting Martinez, 416 U.S. at 423).
104
Id. (quoting Johnson v. State, 2012 WL 3893524, at *1 (Del. Sept. 7, 2012)).
105
Johnson v. State, 983 A.2d 904, 921 (Del. 2009).
106
Id.
107
State’s Resp. to Def.’s Mot. to Suppress ¶¶ 34, 36-37.
27
In Shannon Johnson v. State, the Supreme Court found sufficient particularity
where the subpoena sought “…copies for all incoming and outgoing mail for inmate
[] Johnson. . . from 11-15-2006.”108 Here, the subpoena does more.
First, it states with particularity the materials to be produced, namely, phone
number lists, outgoing call log entries and conversations, video calls, tablet text
messages, in-person meeting recordings, and non-legal incoming and out-going
material as it related to all records regarding telephone and/or visiting room
conversations for Taylor.109
Second, the State provides several reasons why the materials requested are
relevant to its case and ongoing investigative needs. In January 2020, Taylor was
ordered to have No Contact with OMB or STK gang members, his co-defendants,
and the victims or their residences.110 The State argues that “Taylor was convicted
of chasing down and menacing at gunpoint two OMB-adjacent witnesses, victims []
and [], and shooting another victim [], who did not appear for trial. Taylor’s co-
defendant [] was pending trial following Taylor’s guilty verdict, and Taylor’s co-
defendant [] faced a series of threats following his testimony that led to his
108
Johnson, at 921.
109
State’s Resp. to Def.’s Mot. to Suppress ¶ 30.
110
State’s Resp. to Def.’s Mot. to Suppress ¶32.
28
relocation. . . for his safety.111 Additionally, the State presented information that
Taylor was convicted of Assault in a Detention Facility during the pendency of his
case, and that he has been using other inmate PINs for phone calls. 112 This behavior
is consistent with inmate efforts to engage in ongoing criminal behavior while
detained. Accordingly, the State has articulated a credible risk of witness
intimidation and threats. And investigation of potential witness tampering
constitutes a substantial government interest.113
Third, the materials sought covered the period between April 21, 2018, to the
present. As we approach Taylor’s retrial, the credible risk of witness intimidation
articulated by the State justified its request of DDOC. Taking these factors into
consideration, there is nothing to indicate that the State’s subpoena was greater in
scope than necessary to further its legitimate investigative efforts 114 and duties to
prevent Taylor from engaging in criminal activity, as well as to protect the witnesses
from tampering, threats, or intimidation.
111
Id. at ¶ 34.
112
State’s Resp. to Def.’s Mot. to Suppress ¶34.
113
Waters v. State, 242 A.3d 778, 784 (Del. 2020) (quoting Whitehurst, 83 A.3d at 367).
114
Whitehurst, 83 A.3d at 368.
29
VI. CONCLUSION
For the foregoing reasons, Defendant’s Motion to Suppress is DENIED.115
IT IS SO ORDERED.
/s/ Vivian L. Medinilla
Vivian L. Medinilla
Judge
cc: Prothonotary
115
Albeit, without prejudice for Taylor to seek exclusion of any individual evidentiary item he
contends was seized from his phones outside the limitation on the Second Search Warrant the
Court described in n.75, supra.
30