People of Michigan v. Michael Georgie Carson

If this opinion indicates that it is “FOR PUBLICATION,” it is subject to revision until final publication in the Michigan Appeals Reports. STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, FOR PUBLICATION February 15, 2024 Plaintiff-Appellee, 9:15 a.m. V No. 355925 Emmet Circuit Court MICHAEL GEORGIE CARSON, LC No. 20-005054-FC Defendant-Appellant. Before: HOOD, P.J., and REDFORD and MALDONADO, JJ. MALDONADO, J. This case arises from a jury’s conclusion that defendant and his romantic partner, Brandie DeGroff, stole nearly $70,000 from their neighbor’s safe. Thus, defendant was found guilty of safe breaking, MCL 750.531, larceny of property valued at $20,000 or more, MCL 750.356(2)(a), receiving or concealing stolen property valued at $20,000 or more, MCL 750.535(2)(a), larceny from a building, MCL 750.360, and conspiracy to commit each of those offenses, MCL 750.157a. Defendant was sentenced to serve concurrent terms of 10 to 20 years’ imprisonment for the safe- breaking conviction, 9 to 20 years’ imprisonment each for the larceny-of-property and receiving- or-concealing convictions, and 3 to 15 years’ imprisonment for the larceny-from-a-building conviction, plus terms for each conspiracy conviction matching the sentence for its underlying offense. At defendant’s trial, particularly damning was a series of text messages exchanged between defendant and DeGroff in which the couple made numerous references to the crimes for which defendant was convicted. Police obtained these messages following a search of defendant’s phone which was executed pursuant to a warrant. However, the warrant was not obtained until after the phone was seized because the phone was seized incident to defendant’s arrest. Defendant now raises numerous arguments, most of which framed as ineffective assistance of counsel, regarding the initial seizure of the phone, the warrant supporting the search of its contents, and the actual search of the phone. As a threshold matter, we hold that it violates the prohibition against multiple punishments for the same offense for a person to be convicted of both larceny and receiving or concealing stolen property when the convictions arise from the same criminal act because a person who steals property necessarily possesses stolen property. Furthermore, it is well established that a search -1- made pursuant to a general warrant cannot stand; thus, we hold that the warrant authorizing the search of defendant’s cell phone violated the particularity requirement because it authorized a general search of the entirety of the phone’s contents. Finally, we hold that the fruits of this search cannot be saved by the good faith exception to the exclusionary rule because the warrant was plainly invalid. Accordingly, we reverse each of defendant’s convictions and remand for additional proceedings. Because these holdings are sufficient to wholly resolve this appeal and provide guidance on remand, we decline to address other various matters raised by defendant. I. BACKGROUND A. UNDERLYING FACTS Defendant and DeGroff were neighbors of Don Billings. Billings, due to his various health problems, was planning to sell off much of his property so that he could eventually move in with his brother. Defendant had experience with selling goods online, so Billings enlisted the assistance of defendant and DeGroff with selling his property in exchange for them receiving 20% of the proceeds. Defendant was given keys to Billings’s home and was also granted license to look through and rearrange much of Billings’s property. This operation was ongoing from the summer of 2019 until September or October of the same year. Billings did not trust banks, so he stored his life’s savings, along with miscellaneous other documents and valuable goods, in a pair of 40-year-old safes that he kept in his house. The cash was estimated to equal more than $60,000, and it was in hundred-dollar-bills that were divided into $1,000 bundles. The safes could be opened by combination or key, but Billings only used the combination and could not remember where in the house he stored the key. At some point after defendant and DeGroff were no longer assisting Billings, he decided for no particular reason to open the safes. However, he was not able to make the combinations work and ultimately needed to elicit the assistance of a locksmith. Upon opening the safes, Billings discovered that all of the cash was gone. Billings testified that between then and the last time he had opened the safe, only defendant and DeGroff had access to them. However, he never gave them permission to open the safes or attempt to sell any of the safes’ contents. Other circumstantial evidence connected defendant and DeGroff to the theft of the contents of the safes. For example, the police obtained records from a jewelry store indicating that defendant purchased a $1,490 wedding ring on August 6, 2019. The police also obtained a search warrant for records regarding defendant’s and DeGroff’s joint bank account for each month from October 2018 to November 2019. These records indicated that they had $283.13 in the account at the end of July 2019; that they deposited a total of $9,300 in September 2019; and that their September deposits exceeded every other month during that period by approximately $4,000. However, defendant’s employer from April 2, 2019 until August 2, 2019 testified that defendant’s net pay during that entire period was approximately $8,400. He further testified that defendant quit because “he ran across some money and some valuables, gold I believe, in a locker that he bought online, or through some kind of a transaction . . . so, [defendant] had a lot of money that [sic] he didn’t need to work for a while, or something.” Alan Olsen, who lived with and paid rent to defendant and DeGroff from August 2018 until September 2019, testified that the couple was having financial difficulties and that he paid extra rent the final month he lived there to help them. -2- However, Olsen also testified that in August 2019, the couple began going out “every night,” and they would tell him that they were either getting dinner or going to the casino. Finally, the Slot Director for the Odawa Casino testified that the casino used “players club cards” to track players’ earnings because once a certain threshold was exceeded the earnings were subject to income taxation. He explained that the machines at the casino tracked the total money that a player put into the machine, irrespective of wins or losses. In 2019, defendant put a total of $122,000 into the gaming machines at the Odawa Casino, including approximately $57,000 in August of that year. In 2019, defendant’s total losses were approximately $5,000, including just shy of $4,000 in losses from August of that year. Meanwhile, Brandy DeGroff put $47,619 into gaming machines at the Odawa Casino in 2019, including $12,919 in August. DeGroff lost $6,021 in 2019, including $2,368 in August.1 Defendant was arrested on February 26, 2020. Police arrived at defendant’s home at approximately 4:00 a.m., and defendant answered the door wearing only shorts. Prior to escorting him out, Detective Midyett allowed defendant to smoke a cigarette and get dressed. Detective Midyett escorted defendant to his bedroom to get dressed, and while defendant was sitting on his bed tying his shoes, Detective Midyett noticed a cell phone connected to a charger nearby. Detective Midyett asked defendant if the cell phone was his, defendant answered in the affirmative, and the phone was seized. Later, police sought and obtained a warrant to search the phone’s contents and discovered text messages exchanged between defendant and DeGroff that proved to be critical to the prosecution’s case. At the trial, the prosecution asked Detective Matt Leirstein to read from a text conversation extracted from defendant’s phone, dating from August 5-6, 2019: Q. [C]an you tell us who’s sending this text message? A. This looks like it is from [defendant]. Q. Okay. What does it say? A. “Don and Judy were investors in the stock market, complete records for hundreds of thousands of dol1ars.” Q. And what is [DeGroff’s] response . . . ? 1 At the time of the investigation, this author was employed as the Chief Judge of the Tribal Court for the Little Traverse Bay Bands of Odawa Indians, and as such, this author was the signatory of an order giving full faith and credit to a subpoena issued by the circuit court seeking these casino records. The parties were notified of this connection to their case in writing on August 23, 2023, and the parties were assured that this ministerial act in no way impacted the ability of this panel to fairly decide the issues before it. This Court did not receive any requests for this author’s recusal, and any objections from defendant were affirmatively waived at oral arguments. -3- A. “Wow that’s crazy. Have you found any records of what’s in the space yet?” Q. And . . . what’s [defendant’s] response to that? A. [Defendant’s] response is, “In the, what, yet?” Q. And what does [DeGroff] say? A. “Lol, laugh out loud, safe,” meaning, safe. Q. What is [defendant’s] response to that text . . . ? A. “No. I’m guessing it’s all on the computer.” Q. How does [DeGroff] respond? A. “I’m turning it on . . . when I get to go up there again.” Q. And then what’s [defendant’s] response? A. “I just did. . . . Home screen says, ‘Welcome Don.’ ” Q. [DeGroff’s] response? A. “Does it ask for security?” Q. What does [defendant] say to that? A. “No. Opens right up. There isn’t anything on it that I can see. You look later. This is more your field.” Q. The next text message that [defendant] sends to [DeGroff]—what does that say? A. “We need to go through those pennies. If there’s a 1943 copper penny in there, it’s worth millions, these people said. Also, the 1943s pennies can go for twenty thousand dol1ars each—or, $20,000 each.” It doesn’t say dollars. Q. What does [DeGroff] say? A. “Holly Molly! [sic] That’s a lot . . . of money.” Q. Alright. [Defendant’s] response? A. “I’m thinking that these guys cashed out stocks, and whatnot, and converted to cash and gold and silver in the safes.” * * * -4- Q. What’s this text message [defendant] sends to [DeGroff] at about 4:29 p.m. on August 5 . . . ? A. “These are the keys that you’re thinking are safe keys, I think that these are lockbox keys from a bank.” Q. And what’s [DeGroff’s] response? A. “Might be.” The prosecution later asked about an exchange between defendant and DeGroff from August 13, 2019: Q. And what does [defendant] say to [DeGroff]? A. “I’m totally confused. Does he not know there’s a million dollars in those safes?” Q. And how does [DeGroff] respond? A. “I really don’t think he does. I think he opened it up, . . . threw that money in there and closed it.” The prosecution asked about an exchange between defendant and DeGroff from September 2019: Q. . . . Do you recall the testimony of Mr. Billings that he had confronted the defendant about coins missing from the bedroom of his house? A. Yes, I do. Q. Alright. When are the text messages . . . here, what’s the dates ? A. . . . It’s gonna be September 15th, 2019 at 4 p.m. Q. . . . The text message I’m highlighting, this is from [defendant] to [DeGroff], is that right? A. Correct. Q. And what does it say? A. “It amazes me that he’s worried about a few rolls of coins and never went into the safes.” * * * Q. Go to page 6. This highlighted text from [defendant] to [DeGroff], when was that sent? -5- A. It looks like, September 15th, 2019 at 10:12 p.m. Q. Okay. And what does [defendant] say to [DeGroff] in this text that I’m highlighting? A. “He must’ve tried to get into the safe and couldn’t and then thought there was a ton of money in that chest.” Finally, the prosecution asked about a pair of exchanges between the couple from October and November 2019: Q. I want you to read for the jury the text message [defendant] sends [DeGroff] on October 29 at about 4:15 p.m. . . . What did [defendant] say to her? A. “Yeah, right. It’s all you’ve done is use me and cheat on me.” Q. . . . [DeGroff’s] response . . . ? A. “Right. Um, use you for what? ‘Cause I haven’t made any money or help you steal sixty thousand dollars? And cheat? When? Tell me when I had the opportunity to fucking cheat? You are the one who didn’t work most of the summer and hasn’t held a single job.” Q. . . . Like you to read the text message the defendant sent [DeGroff] on November 24 at 10:51 a.m. . . . What does [defendant] say to Brandy DeGroff in this text message? A. “I just need to go. . . . I’m always full of anger and everyone at home is in line of fire and it’s not fair to all of you. It’s just best I, not, be there until I get some sort of help to calm me and help me sleep. It doesn’t help that I’m overly stressed over our finances. . . . I wish now that I had a way to go rob those entire safes. Tomorrow I’m taking all that other money to the bank and just deposit it . . . . Fuck chasing shit around. I’m trying to sell shit and bring money in but it’s not working. I’m a mixed ball of everything and I’m going fucking crazy.” B. POSTCONVICTION HISTORY Defendant was found guilty as described in the opening paragraph of this opinion, supra, was sentenced in December 2020, and filed a claim of appeal in this Court on January 4, 2021. On September 10, 2021, while this appeal was pending, defendant filed a motion for a new trial in the circuit court. Defendant argued that his cell phone was seized pursuant to an impermissible warrantless search; that the police impermissibly questioned defendant regarding his ownership of the phone without having first issued Miranda2 warnings; that the affidavit in support of the police’s request for a search warrant was inadequate in that it failed to establish probable cause to 2 Miranda v Arizona, 384 US 436; 86 S Ct 1602; 16 L Ed2d 694 (1966). -6- believe that the cell phone would contain relevant evidence; that the prosecution had impermissibly added charges in retaliation to defendant’s motion to suppress; and that defense counsel’s failure to raise these issues constituted ineffective assistance of counsel. On October 21, 2021, the circuit court ordered additional briefing, and on December 30, 2021, the trial court ordered a Ginther3 hearing. The Ginther hearing was conducted on April 28, 2022, and defendant’s trial attorney, Duane Beach, testified extensively regarding the matters raised in defendant’s motion. The relevant details of Beach’s testimony are presented in Section II, infra, of this opinion. At the hearing’s conclusion, the court elected to engage in further deliberations. On May 17, 2022, the circuit court issued a written opinion and order denying defendant’s motion for a new trial. In relevant part, the court concluded that (1) Beach erred by failing to seek suppression of defendant’s admission to police that he owned the cell phone, but this was harmless because the circumstantial evidence of defendant’s ownership was overwhelming; (2) Beach should have filed a motion to suppress the contents of defendant’s cell phone “if only to preserve the appeal,” but this error was likewise harmless because even if the warrant was deficient, the good faith exception to the exclusionary rule would apply; (3) Beach’s decision not to file a motion to quash the amended information was a reasonable strategic choice; (4) defendant’s evidentiary arguments were without merit; and (5) defendant’s convictions of both larceny of stolen property and receiving and concealing stolen property did not raise double jeopardy concerns. Following the conclusion of postconviction matters in the circuit court, this appeal proceeded. II. DISCUSSION Defendant argues that finding him guilty of larceny and receiving and concealing stolen property for the same act violated his double jeopardy rights. Defendant further argues that the contents of his cell phone were inadmissible because they were seized pursuant to a facially invalid search warrant and that Beach rendered ineffective assistance by failing to seek exclusion pursuant to these grounds. We agree. Because these conclusions are dispositive, we do not reach defendant’s remaining arguments. Claims of ineffective assistance of counsel present mixed questions of fact and law. People v Head, 323 Mich App 526, 539; 917 NW2d 752 (2018). Factual findings are reviewed for clear error and legal conclusions are reviewed de novo. Id. Questions of constitutional law are reviewed de novo. People v Herron, 464 Mich 593, 599; 628 NW2d 528 (2001). 3 People v Ginther, 390 Mich 436; 212 NW2d 922 (1973). -7- A. DOUBLE JEOPARDY Defendant’s double jeopardy rights were violated because his convictions of larceny and receiving or concealing stolen property arose from the same act—the theft of the money taken from Billings’s safe.4 The Double Jeopardy Clauses of the federal and state Constitutions prohibit placing a criminal defendant twice in jeopardy for a single offense. People v Booker (After Remand), 208 Mich App 163, 172; 527 NW2d 42 (1994), citing US Const, Ams V, XIV and Const 1963, art 1, § 15. “The prohibition against double jeopardy provides three related protections: (1) it protects against a second prosecution for the same offense after acquittal; (2) it protects against a second prosecution for the same offense after conviction; and (3) it protects against multiple punishments for the same offense.” People v Nutt, 469 Mich 565, 574; 677 NW2d 1 (2004). The Legislature retains the option, however, of punishing a crime through creating the possibility of multiple convictions and sentences stemming from a single criminal act. See People v Wafer, 509 Mich 31, 38; 983 NW2d 315 (2022). Where the Legislature has not clearly indicated its intent to allow cumulative punishments, it is necessary to “examine the abstract legal elements of the two offenses, rather than the facts of the case, to determine whether the protection against multiple punishments for the same offense has been violated.” People v Dickinson, 321 Mich App 1, 15; 909 NW2d 24 (2017) (emphasis added). When applying the “abstract legal elements test,” we are instructed to determine whether “each of the offenses for which defendant was convicted has an element that the other does not.” People v Miller, 498 Mich 13, 19; 869 NW2d 204 (2015) (quotation marks, citation, and alteration omitted). This test can be satisfied and dual convictions may stand even if there is “a substantial overlap in the proof offered to establish the crimes.” Nutt, 469 Mich at 576, quoting Blockburger v United States, 284 US 299, 304; 52 S Ct 180; 76 L Ed 306 (1932). This issue was addressed more than 30 years ago when this Court decided People v Johnson, 176 Mich App 312; 439 NW2d 345 (1989), a case which defendant views as dispositive. In Johnson, the defendant pleaded guilty to larceny of property worth more than $100 and possession of stolen property worth more than $100 following the theft of 14 shirts from a store. Id. at 313. To resolve the defendant’s double jeopardy argument, this Court inquired “into whether the Legislature intended to authorize multiple punishment under different statutes for a single criminal transaction.” Id. This Court concluded “that the Legislature did not intend to provide for multiple punishment under both these statutes” because “the punishment provided by each statute is exactly the same” and because “[e]ach statute prohibits conduct which violates the same social 4 While the discussion regarding the contents of defendant’s cell phone found in section II.B, infra, is sufficient to wholly adjudicate this appeal, the double jeopardy argument still merits addressing because it will be an issue if defendant is tried again on remand. See People v Richmond, 486 Mich 29, 34-35; 782 NW2d 187 (2010) (explaining that an issue is not moot if its resolution will have practical effects on the case). -8- norm: theft of property.” Id. at 314. This Court concluded that the purpose of the statutory framework was “to enlarge the prosecutor’s arsenal to allow alternate charging and conviction of a thief under either the larceny statute or the receiving and concealing statute. Defendant could have been charged and convicted under either statute for this theft, but not under both of them.” Id. at 315. The prosecution reminds us that Johnson predates the conflict rule, MCR 7.215(J)(1), and thus is not binding precedent. However, although “[d]ecisions published before November 1, 1990, are not binding on this Court . . . , those decisions are entitled to deference under traditional principles of stare decisis and should not be lightly disregarded.” People v Haynes, 338 Mich App 392, 415 n 1; 980 NW2d 66 (2021). We view Johnson’s reasoning as sound, and we reaffirm its conclusion that the legislature did not intend for cumulative punishments pursuant to these two statutes. The true problem with Johnson as it applies now is that, because of the state of double jeopardy law at the time it was decided, it did not apply the abstract legal elements test. Thus, as the law currently stands, Johnson’s analysis is incomplete. We therefore will finish what Johnson started and apply the abstract legal elements test to these two statutes as they are currently written. We conclude that it is not possible for a person to be guilty of larceny without also being guilty of receiving or concealing stolen property; therefore, the same act cannot give rise to convictions for both crimes. MCL 750.356(1) provides: A person who commits larceny by stealing any of the following property of another person is guilty of a crime as provided in this section: (a) Money, goods, or chattels. (b) A bank note, bank bill, bond, promissory note, due bill, bill of exchange or other bill, draft, order, or certificate. (c) A book of accounts for or concerning money or goods due, to become due, or to be delivered. (d) A deed or writing containing a conveyance of land or other valuable contract in force. (e) A receipt, release, or defeasance. (f) A writ, process, or public record. (g) Scrap metal. On the other hand, MCL 750.535(1) provides: “A person shall not buy, receive, possess, conceal, or aid in the concealment of stolen, embezzled, or converted money, goods, or property knowing, or having reason to know or reason to believe, that the money, goods, or property is stolen, embezzled, or converted.” The catchall term “property” as it is used in MCL 750.535(1) subsumes the entire list provided in MCL 750.356(1)(a)-(g). In other words, if a person steals one of the items articulated -9- in the list provided in MCL 750.356(1), then the person has necessarily stolen “money, goods, or property” as the term is used in MCL 750.535(1). Additionally, a person who steals necessarily possesses the item that was stolen. Thus, a person who steals one of the items articulated by MCL 750.356(1) has necessarily possessed stolen money, goods, or property. Moreover, MCL 750.356(1)(a) establishes that stealing another’s money, goods, or chattels is a crime by itself; Subsections (2) through (5) set forth different penalties depending on the value of the property stolen, covering the whole gamut of possibilities, from under $200 under Subsection (5), to $20,000 or more under Subsection (2). Similarly, MCL 750.535(1) establishes that possessing property actually or constructively known to be stolen is a crime by itself, and the subsections that follow set forth different penalties depending on the value of the property stolen, covering values from under $200 under Subsection (5), to $20,000 or more under Subsection (2)(a). This alignment of statutory provisions thus guarantees that any theft pursuant to MCL 750.356 will constitute possession of stolen property pursuant to MCL 750.535. For these reasons, we conclude that a person cannot be convicted of both larceny and receiving or concealing stolen property as a result of the same criminal act. However, for the purposes of this case, our analysis does not end here. This was raised through the analytical framework of ineffective assistance, and we still must establish whether defendant has established ineffective assistance of counsel. Little discussion is needed to answer this question in the affirmative. “To prevail on a claim of ineffective assistance, a defendant must, at a minimum, show that (1) counsel's performance was below an objective standard of reasonableness and (2) a reasonable probability exists that the outcome of the proceeding would have been different but for trial counsel's errors.” Head, 323 Mich App at 539 (quotation marks, citation, and alteration omitted). Defense counsel erred by allowing defendant to be punished twice for the same offense, and the outcome of the proceeding would have been different if not for this error because it would have prevented defendant’s conviction of one of these two offenses as well as the accompanying conspiracy charge. Therefore, defendant’s double jeopardy argument establishes a claim of ineffective assistance of counsel. In conclusion, the constitutional double jeopardy protections bar defendant from being reconvicted of both larceny and receiving or concealing stolen property, as well as both corresponding conspiracy charges, if he is tried again on remand.5 B. CONTENTS OF DEFENDANT’S CELL PHONE The warrant authorizing a search of the contents of defendant’s cell phone was too broad in violation of the particularity requirement, and the good faith exception is inapplicable to these 5 In other words, defendant can permissibly be convicted of conspiracy to commit larceny or conspiracy to commit receiving or concealing stolen property but not both. This is because, pursuant to the same analysis, a person cannot conspire to steal property without also conspiring to possess the same stolen property, so a conviction of both would violate the constitutional double jeopardy protections. -10- facts. Therefore, defense counsel’s failure to seek exclusion of the phone’s contents for these grounds was ineffective assistance warranting reversal. 1. PARTICULARITY REQUIREMENT The search warrant in this case was invalid because it failed to particularly describe what the police sought to search and seize. “[T]he general rule is that officers must obtain a warrant for a search to be reasonable under the Fourth Amendment.” People v Hughes, 506 Mich 512, 525; 958 NW2d 98 (2020). The warrant requirement applies to searches of cell phone data. Id., citing Riley v California, 573 US 373; 134 S Ct 2473; 189 L Ed2d 430 (2014). The Fourth Amendment only allows search warrants “particularly describing the place to be searched, and the persons or things to be seized.” US Const, Am IV. A substantially similar provision can be found in the Michigan Constitution. Const 1963, art 1 § 11.6 “The purpose of the particularity requirement in the description of items to be seized is to provide reasonable guidance to the executing officers and to prevent their exercise of undirected discretion in determining what is subject to seizure.” People v Unger, 278 Mich App 210, 245; 749 NW2d 272 (2008) (quotation marks and citation omitted). “A search warrant is sufficiently particular if the description is such that the officer with a search warrant can, with reasonable effort, ascertain and identify the people and property subject to the warrant.” People v Brcic, ___ Mich App ___, ___; ___ NW2d ___ (2022) (Docket No. 359497); slip op at 4 (quotation marks and citation omitted). Whether a warrant satisfied the particularity requirement depends on “the circumstances and the types of items involved.” Unger, 278 Mich App at 245. It is “well settled that a search may not stand on a general warrant.” People v Hellstrom, 264 Mich App 187, 192; 690 NW2d 293 (2004). In the context of cell phone data, the Michigan Supreme Court has concluded that “allowing a search of an entire device for evidence of a crime based upon the possibility that evidence of the crime could be found anywhere on the phone and that the incriminating data could be hidden or manipulated would render the warrant a general warrant . . . .” Hughes, 506 Mich at 542, quoting People v Herrera, 357 P3d 1227 (Colo 2015). In this case, the warrant itself described the “person, place, or thing to be searched” as the “[c]ellular device belonging to [defendant] and seized from his person upon arrest.”7 The property to be searched for and seized was described as follows: 6 The Michigan Supreme Court has held that these two provisions are “to be construed to provide the same protection” unless there is a “compelling reason to impose a different interpretation.” People v Katzman, 505 Mich 1053, 1053; 942 NW2d 36 (2020) (quotation marks and citation omitted). 7 When assessing whether the warrant sufficiently described the places to be searched and items to be seized, we have not considered the contents of the supporting affidavit because the warrant did not contain “appropriate words of incorporation” directing the officers to refer to the affidavit during execution of the search. See Brcic, ___ Mich App ___; slip op at 4 (quotation marks and citation omitted). -11- Any and all records or documents* pertaining to the investigation of Larceny in a Building and Safe Breaking. As used above, the term records or documents includes records or documents which were created, modified or stored in electronic or magnetic form and any data, image, or information that is capable of being read or interpreted by a computer. In order to search for such items, searching agents may seize and search the following: cellular devices; Any [sic] physical keys, encryption devices and similar physical items that are necessary to gain access to the cellular device to be searched or are necessary to gain access to the programs, data, applications and information contained on the cellular device(s) to be searched; Any [sic] passwords, password files, test keys, encryption codes or other computer codes necessary to access the cellular devices, applications and software to be searched or to convert any data, file or information on the cellular device into a readable form; This [sic] shall include thumb print and facial recognition and or digital PIN passwords, electronically stored communications or messages, including any of the items to be found in electronic mail (“e-mail”). Any and all data including text messages, text/picture messages, pictures and videos, address book, any data on the SIM card if applicable, and all records or documents which were created, modified, or stored in electronic or magnetic form and any data, image, or information that is capable of being read or interpreted by a cellular phone or a computer. Simply put, this was a general warrant that gave the police license to search everything on defendant’s cell phone in the hopes of finding anything, but nothing in particular, that could help with the investigation. This warrant did not place any limitations on the permissible scope of the search of defendant’s phone. The only hint of specificity was the opening reference to “the investigation of Larceny in a Building and Safe Breaking,” but this small guardrail was negated by the ensuing instruction to search for such items by searching and seizing the entirety of the phone’s contents. The evidence clearly established that there was probable cause to believe that defendant and DeGroff collaborated to break into Billings’s safe and steal its contents, which included his entire life’s savings. Given the nature of defendant’s and DeGroff’s relationship, there was likewise probable cause to believe that defendant had used his phone to communicate with DeGroff regarding these crimes. Therefore, it would have been wholly appropriate to issue a warrant authorizing the police to engage in a search of the phone’s contents limited in scope to correspondence between these two regarding the crimes; this would include SMS messages, internet-based messaging applications such as Messenger or SnapChat, direct messages sent through social media platforms such as Instagram or Twitter, emails, and other similar applications. The warrant that was actually issued placed no limitations on the scope of the search and authorized the police to search everything, specifically mentioning photographs and videos. Authorization for a search of defendant’s photographs and videos, despite there being no evidence suggesting that these files would yield anything relevant, is particularly troubling in light of the tendency of people in our modern world to store compromising photographs and videos of themselves with romantic partners on their mobile devices. Moreover, people usually can directly access file storage systems such as Dropbox and Google Drive directly from their phones, creating a whole new realm of personal information that the police was given free license to peruse. The pandemic also saw the emergence of applications such as “BetterHelp” and “Talkspace” through -12- which people can have text message-based sessions with their psychotherapists, and applications such as “MyChart” allow mobile storage of detailed medical records as well as private conversations between patients and doctors. Simply put, this warrant authorized precisely the form “wide-ranging exploratory searches the framers intended to prohibit.” Hughes, 506 Mich at 539 (quotation marks and citation omitted). Indeed, there are likely many people who would view an unfettered search of the contents of their mobile device as more deeply violative of their privacy than the sort of general search of a home that the framers originally intended to avoid. We are living in a time during which it can be reasonably assumed that any given person essentially has their entire life accessible from their phones. The Unites States Supreme Court commented on this fact when it decided Riley: [T]here is an element of pervasiveness that characterizes cell phones but not physical records. Prior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day. Now it is the person who is not carrying a cell phone, with all that it contains, who is the exception. . . . A decade ago police officers searching an arrestee might have occasionally stumbled across a highly personal item such as a diary. But those discoveries were likely to be few and far between. Today, by contrast, it is no exaggeration to say that many of the more than 90% of American adults who own a cell phone keep on their person a digital record of nearly every aspect of their lives—from the mundane to the intimate. [Riley, 573 US at 395 (citations omitted).] Thus, warrants for searching and seizing the contents of a modern cell phone must be carefully limited in scope. This is not to say that the police must be told precisely what they are looking for or where to find it, but there must be guardrails in place. The warrant in this case authorized the modern equivalent of the police combing through a person’s entire home in search of any evidence that might somehow implicate the person in the crime for which they were a suspect. We are aware of no binding authority8 discussing the analysis of whether the language of a warrant authoring a search of cell phone data comports with the particularity requirement; however, several other states have likewise concluded that it is inappropriate for a warrant to authorize an unfettered search of a phone’s entire contents. For example, in State v Smith, 344 Conn 229, 250-252; 278 A3d 481 (2022), the Connecticut Supreme Court concluded that a warrant “which allowed for a search of the entire contents of the cell phone” was invalid “because it did not sufficiently limit the search of the contents of the cell phone by description of the areas within the cell phone to be searched, or by a time frame reasonably related to the crimes.” In State v Bock, 310 Or App 329, 335; 485 P3d 931 (2021), the Oregon Court or Appeals concluded that a “warrant that authorizes seizure of any item on a cell phone that might later serve” as evidence of 8 The specifics of the Michigan Supreme Court’s opinion in Hughes are not entirely on point because the Court was examining whether the police, by examining the phone’s entire contents, acted within scope of the warrant. See Hughes, 506 Mich at 539-550. In this case, the issue we are discussing is whether the scope of the warrant was too broad, not whether the police acted within the scope of the warrant. -13- a crime “is tantamount to a general warrant.” Additionally, in People v Coke, 461 P3d 508, 516 (Colo 2020), Colorado’s Supreme Court invalidated a search warrant that allowed police “to search all texts, videos, pictures, contact lists, phone records, and any data that showed ownership or possession.” Numerous other examples establish that many states have joined in our conclusion that that the particularity requirement disallows the issuance of warrants authorizing police to search the entirety of a person’s cell phone contents for evidence of a particular crime; the massive scale of the personal information people store on their mobile devices means that there must be some limits to the scope of the search. See, e.g., Richardson v State, 481 Md 423, 468; 282 A3d 98 (Md Ct App 2022) (“While reasonable minds may differ at times on whether a warrant is sufficiently particular, one thing is clear: given the privacy interests at stake, it is not reasonable for an issuing judge to approve a warrant that simply authorizes police officers to search everything on a cell phone.”); State v Wilson, 315 Ga 613, 615; 884 SE2d 298 (2023) (invalidating warrant that provided a “limitless authorization to search for and seize any and all data that can be found on [the defendant’s] cell phones”). For these reasons, we conclude that the search warrant in this case did not satisfy the particularity requirement. 2. GOOD FAITH EXCEPTION The good faith exception to the exclusionary rule does not apply because this was a facially invalid general warrant upon which no reasonable officer could have relied in objective good faith. “The exclusionary rule is a judicially created remedy that originated as a means to protect the Fourth Amendment right of citizens to be free from unreasonable searches and seizures.” People v Hawkins, 468 Mich 488, 498; 668 NW2d 602 (2003). In general, this rule bars admission of evidence that was obtained during an unreasonable search. Id. at 498-499. However, the exclusionary rule has been “modified by several exceptions” that allow such evidence to be admitted under certain circumstances. Id. (citation omitted). The purpose of the exclusionary rule is not “to ‘make whole’ a citizen who has been subjected to an unconstitutional search or seizure. Rather,” the rule’s purpose is to deter future police misconduct. Id. at 499. For this reason, the United States Supreme Court carved out the “good-faith” exception to the exclusionary rule when it decided United States v Leon, 468 US 897; 104 S Ct 3405; 82 L Ed2d 677 (1984). The good- faith exception “renders evidence seized pursuant to an invalid search warrant admissible as substantive evidence in criminal proceedings where the police acted in reasonable reliance on a presumptively valid search warrant that was later declared invalid.” People v Hughes, 339 Mich App 99, 111; 981 NW2d 182 (2021). This exception has also been recognized by the Michigan Supreme Court. People v Goldston, 470 Mich 523, 525-526; 682 NW2d 479 (2004). The rationale behind this exception is that the exclusionary rule was crafted to deter police misconduct and therefore should not apply when a magistrate made an error rather than the police. Hughes, 339 Mich App at 111. The good-faith exception does not mean that evidence obtained pursuant to a search warrant will always be admitted, and the United States Supreme Court explained scenarios in which this exception will not apply when it decided Leon: -14- Suppression . . . remains an appropriate remedy if the magistrate or judge in issuing a warrant was misled by information in an affidavit that the affiant knew was false or would have known was false except for his reckless disregard of the truth. The exception we recognize today will also not apply in cases where the issuing magistrate wholly abandoned his judicial role . . . ; in such circumstances, no reasonably well trained officer should rely on the warrant. Nor would an officer manifest objective good faith in relying on a warrant based on an affidavit so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable. Finally, depending on the circumstances of the particular case, a warrant may be so facially deficient—i.e., in failing to particularize the place to be searched or the things to be seized—that the executing officers cannot reasonably presume it to be valid. [Leon, 468 US at 923 (citations omitted; emphasis added).] There is little guidance offered by Michigan caselaw on the applicability of the good-faith exception in the context of a search warrant violative of the particularity requirement. This Court has suggested that a search warrant is “plainly invalid” if “it failed to describe the type of evidence to be sought.” Brcic, ___ Mich App at ___; slip op at 4, quoting Groh v Ramirez, 540 US 551, 557; 124 S Ct 1284; 157 L Ed2d 1068 (2004). However, this statement was not made in the context of a good-faith exception analysis. There is some guidance from other jurisdictions, but the results are mixed. For example, in Richardson, 481 Md at 470-472, the Maryland Court of appeals concluded that the good-faith exception did apply, reasoning that the officers who executed the warrant could not have known that it was impermissible to search the entire phone. However, in Burns v United States, 235 A 3d 758 (DC Ct App 2020), the District of Columbia Court of Appeals concluded that the good-faith exception did not apply because of the obvious overbreadth of the warrant. One difficulty that arises when looking to other states for guidance is that there is significant variance in the extent to which each state has adopted this exception to the exclusionary rule. For example, in State v McLawhorn, 636 SW3d 210, 245 (Tenn Ct Crim App 2020), the Tennessee Criminal Court of Appeals concluded that the good-faith exception did not apply in a case in which a warrant impermissibly authorized “an unfettered search of all data on the Defendant’s cell phone,” but Tennessee had only adopted a limited version of the good-faith exception that applied to “evidence which had been seized in accord with binding precedent existing at the time,” cases involving technical flaws to otherwise valid warrants, and cases involving negligence as opposed to “systemic error or reckless disregard of constitutional requirement.” Id. (quotation marks and citation omitted). In Michigan, while there is no caselaw suggesting that our good-faith exception is coextensive with its federal counterpart, there likewise appears to be no caselaw restricting its applicability in manners not present in federal caselaw. We conclude that the warrant in this specific case was so facially deficient by virtue of its failure to particularize the places to be searched and things to be seized that the executing officers could not have reasonably presumed it to be valid. See Leon, 468 US at 923. As discussed in detail in section II.A, supra, this case involved a general warrant authorizing a search of the phone’s entire contents for any incriminating evidence. It is common knowledge that people store an incredible amount of personal data on their phones, and the prohibition against general warrants is long-established. The plainly invalid breadth of this warrant is further evidenced by the fact that the police ultimately seized approximately 1,000 pages of personal information from defendant’s phone that consisted of all of its contents. No officer could reasonably have believed that such a -15- far-reaching search complied with the constitutional demand for particularity. Lack of good-faith is further evidenced by the affidavit submitted by the police when they sought the search warrant because the police made no secret of their intent to engage in a fishing expedition. In particular, the following paragraph is alarming: Records created by mobile communication devices can also assist law enforcement in establishing communication activity/behavior, patterns, anomalies, patterns of life and often the identity of the device user. This is most effectively accomplished by reviewing a larger segment of records ranging prior to and after the incident under investigation if possible. The preparing officer essentially admitted knowledge of the breadth of personal information available on modern cell phones, as was detailed above,9 and stated his intent to comb through all of it. To be clear, we do not hold that searches executed pursuant to a warrant that is defective by virtue of allowing an overly broad search of a person’s cell phone can never be saved by the good-faith exception. However, given the particularly egregious facts of this case, we conclude that the good faith exception does not apply, and the contents of defendant’s cell phone should not have been admitted at his trial. 3. INEFFECTIVE ASSISTANCE Reversal of defendant’s conviction is warranted because defense counsel’s failure to seek exclusion of the cell phone’s contents on this basis constituted defective representation, and there is a reasonable probability that the outcome of defendant’s trial would have been different but for defense counsel’s error. The Sixth Amendment of the United States Constitution guarantees that criminal defendants receive effective assistance of counsel. Strickland v Washington, 466 US 668, 687- 688; 104 S Ct 2052; 80 L Ed2d 674 (1984). Michigan’s Constitution affords this right the same level of protection as the United States Constitution. People v Pickens, 446 Mich 298, 318-320; 521 NW2d 797 (1994). Accordingly, “[t]o prevail on a claim of ineffective assistance, a defendant must, at a minimum, show that (1) counsel's performance was below an objective standard of reasonableness and (2) a reasonable probability exists that the outcome of the proceeding would have been different but for trial counsel's errors.” Head, 323 Mich App at 539 (quotation marks, citation, and alteration omitted). “[A] reasonable probability is a probability sufficient to undermine confidence in the outcome.” People v Randolph, 502 Mich 1, 9; 917 NW2d 249 (2018). This Court presumes counsel was effective, and defendant carries a heavy burden to overcome this presumption. Head, 323 Mich App at 539. As discussed above, the contents of defendant’s cell phone were inadmissible because the warrant’s total failure to comply with the particularity requirement rendered it facially invalid. Despite this, defense counsel did not move for the exclusion of the cell phone records on this basis. 9 See section II.A, supra. -16- Such matters are presumed to be an exercise of reasonable trial strategy by defense counsel, People v Traver, 328 Mich App 418, 422-423; 937 NW2d 398 (2019), but after reviewing the record, we conclude that the presumption has been overcome. Defense counsel did not have a valid strategic reason for failing to seek exclusion of the cell phone’s contents as violative of the particularity requirement. Attorney Beach testified about this issue at the Ginther hearing. Beach described portions of the warrant’s supporting affidavit as “weasel language” and acknowledged that the warrant authorized seizure of all of the phone’s contents, but he did not believe suppression on this basis would have been warranted because it “got really specific towards the end.” Beach explained why he did not file a motion to suppress the contents of the cell phone in addition to his motion to suppress the phone itself: Well, because the Affidavit was fine. I—I thought in my mind that [the trial judge erred by not granting the motion to suppress the cell phone] . . . . [A]nd then I look at this search warrant, and frankly, this search warrant probably provides a basis to look for that cell phone. And after that, the content of the cell phone is basically pro forma. I’m surprised it said as much as it did. If they got the cell phone, they’re going to look at it. Beach appeared to be suggesting a mistaken belief that once the police had a lawful basis for seizing the phone they also had the right to search the entirety of its contents. Therefore, once he failed to convince the court that the warrantless seizure of the device itself was unlawful, he did not seem to believe he had any recourse. In other words, Beach’s failure to seek exclusion of the phone’s contents was based on a misunderstanding of the law rather than trial strategy. Turning to the second prong, it is not difficult for us to conclude that there is a reasonable probability that the trial would have had a different outcome had the contents of the cell phone not been admitted.10 We acknowledge that there was persuasive circumstantial evidence outside of the phone’s contents connecting defendant to the crimes. The properly admitted evidence established that defendant did not have a significant source of income when he began selling property for Billings and that he and DeGroff only had $283.13 in their joint bank account at the end of July 2019. However, in September 2019, not long before Billings discovered that the contents of the safes were missing, defendant deposited nearly $10,000 into the bank account he shared with DeGroff, and in August 2019 defendant put $57,000 into the gaming machines at the Odawa Casino. Also, defendant quit his job and told his boss that he no longer needed the work because he had found valuables in a locker he purchased online. Moreover, Billings testified that only defendant and DeGroff could have accessed the safes during the period when they were 10 Indeed, even the trial court, following the Ginther hearing, described “[t]he contents of the phone—specifically the text messages” as “integral to the Prosecutor’s case” and opined that there was “a reasonable probability that the outcome of the trial would have been different” if the phone’s contents had been excluded. The reason the court did not grant a new trial, however, was due to its erroneous conclusion that the good-faith exception applied. -17- emptied. This evidence was sufficient to prove beyond a reasonable doubt that defendant and DeGroff conspired to steal the contents of Billings’s safe.11 While the properly admitted evidence was persuasive, the tainted evidence was essentially definitive. Indeed, defendant and DeGroff each made several statements that could fairly be characterized as confessions. For example, on August 5, defendant sent DeGroff a text telling her that he believed he had found keys to the safes. On August 13, defendant told DeGroff that there was “a million dollars in those safes,” and DeGroff speculated that Billings just “threw that money in [the safe] and closed it.” On October 29, DeGroff insinuated that she helped defendant “steal sixty thousand dollars.” On November 24, defendant wished he “had a way to go rob those entire safes.” The value of these text messages to the prosecution’s case-in-chief, other persuasive evidence notwithstanding, cannot be overstated. Had the jury been presented only the properly admitted evidence, a guilty verdict would have been unsurprising. When this evidence is taken in conjunction with the text messages, a not guilty verdict would have been shocking. Therefore, we conclude that there is a reasonable probability that the outcome of the proceeding would have been different if not for Beach’s mistakes. III. CONCLUSION Defendant’s convictions are reversed. We remand for additional proceedings consistent with this opinion. If defendant is retried, evidence regarding the contents of defendant’s cell phone shall not be admitted. Additionally, defendant shall not be reconvicted of both larceny of property valued at $20,000 or more and receiving and concealing stolen property valued at $20,000 or more. Nor shall defendant be convicted of the corresponding conspiracy counts for both of those charges. We do not retain jurisdiction. /s/ Allie Greenleaf Maldonado /s/ Noah P. Hood 11 Indeed, given the strength of the properly admitted evidence, it is not obvious that the outcome of this appeal would be the same if we were reviewing through a different reversal standard, such as plain error or harmless error, rather than the Strickland “reasonable probability” test. -18-