SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
UNITED STATES DISTRICT COURT
CENTRAL DISTRICT OF ILLINOIS
UNITED STATES OF AMERICA, )
)
Plaintiff, )
)
v. ) Case No. 15-10029
)
DEMONTAE BELL, )
)
Defendant. )
ORDER AND OPINION
This matter is now before the Court on Defendant Demontae Bell’s Amended Motion
[53] to Suppress. For the reasons set forth below, Defendant’s Motion is DENIED.
Background
On November 6, 2014, the Pekin Police Department responded to a report of a burglary
where a Glock pistol, two AR-15 style rifles, and an AK-47 style rifle were stolen from a
residential building in Pekin, Illinois. The resident reported a name to the police who he believed
stole the firearms. The police interviewed that person, “C/S-1,” who had been arrested on
charges related to the manufacture of methamphetamine. C/S-1 admitted to stealing the firearms,
and told the police that he sold them in Peoria to a drug dealer known as “Jay” for money and
cocaine.
After the interview, the informant began working with the FBI and Illinois State Police as
part of a proffer agreement in order to recover the firearms. The agents and C/S-1 arranged a
controlled purchase of a small amount of cocaine from “Jay,” where video and photographs were
taken of the suspect. Later, an FBI agent interviewed an inmate at Peoria County Jail. After the
agent showed the inmate portions of the video and photos taken during the controlled buy, the
inmate recognized Defendant as Demontae Bell. The agent accessed the Peoria County Jail’s
1
E-FILED
Wednesday, 20 April, 2016 12:40:12 PM
Clerk, U.S. District Court, ILCD
1:15-cr-10029-JES-JEH # 71 Page 1 of 16
online record system after the interview and printed a photo of Bell without any identifiers.
When the agent showed the photo to C/S-1, the informant identified the individual in the photo
as Demontae Bell. On February 23, 2015, the FBI agent searched Bell’s criminal history and
found a prior felony conviction for delivery of controlled substances.
On February 25, 2015, the FBI and State Police conducted a second controlled buy of
cocaine from Bell, again recording audio and video of the transaction. Bell entered C/S-1’s
vehicle and conversed with the informant about attempts to locate magazines for the stolen AK-
47 rifle, and Bell informed C/S-1 that he sold the weapon. Bell told C/S-1 that he had a photo of
the AK-47 on his phone, which he sent to C/S-1 via picture message and the FBI agent later
viewed.
Bell was arrested on April 9, 2015, for possession of the stolen AK-47 and charged with
being a felon in possession of a firearm, in violation of Title 18 United States Code, Section
922(g). Upon Bell’s arrest, a black mobile flip phone was located on his person. After Bell was
arrested, he was transported to the Peoria Police Department and placed in an interview room.
Shortly thereafter, Officer Sinks arrived at the police station (he was not the arresting officer). At
the suppression hearing Sinks testified that before interviewing Bell with agent Nixon, he opened
the door to the interview room, grabbed Bell’s cell phone from a bag or container outside the
door, opened the phone (purportedly to turn it off) and showed the home screen depicting the
rifle to Bell with an inquisitive look. Officer Sinks then held the power button on the phone to
turn it off. Once SA Nixon arrived, Sinks told him what he saw on the phone. In the interview
room, Officer Sinks and SA Nixon again opened the phone, which was now turned off, and then
removed the battery and recorded the serial numbers on the device.
2
1:15-cr-10029-JES-JEH # 71 Page 2 of 16
On April 17, 2015, the United States submitted an application for a search warrant based
on the affidavit of Special Agent Jason Nixon, and Judge McDade granted the warrant the same
day. A subsequent search warrant for electronically stored data relating to the date and time the
picture was taken was granted on October 20, 2015.
Legal Standard
“Where a search is undertaken by law enforcement officials to discover evidence of
criminal wrongdoing . . . reasonableness generally requires the obtaining of a judicial warrant.”
Veronia School Dist. 47J v. Acton, 515 U.S. 646, 653 (1995). Thus, “searches conducted outside
the judicial process, without prior approval by a judge or magistrate, are per se unreasonable
under the Fourth Amendment—subject only to a few specifically established and well-delineated
exceptions.” Arizona v. Gant, 556 U.S. 332, 338 (2009) (quoting Katz v. United States, 389 U.S.
347, 357 (1967)). One exception to the warrant requirement is for a search incident to a lawful
arrest. Chimel v. California, 395 U.S. 752 (1969).
Although a search incident to lawful arrest remains an exception to the warrant
requirement, the Supreme Court has declined to extend the categorical rule for searches incident
to arrest to searches of data on cell phones. Riley v. California, 134 S.Ct. 2473, 2485 (2014)
(holding that officers must generally secure a warrant before conducting a search of data on cell
phones, even when a cell phone is seized incident to arrest). Part of the Supreme Court’s
rationale for treating cell phones differently stemmed from the fact that “[c]ell phones differ in
both a quantitative and qualitative sense from other objects that might be kept on an arrestee’s
person.” Riley, 134 S.Ct. at 2489. In holding that the search incident to arrest exception to the
warrant requirement does not extend to cell phones, the Supreme Court noted that “other case-
3
1:15-cr-10029-JES-JEH # 71 Page 3 of 16
specific exceptions may still justify a warrantless search of a particular phone,” such as the
exigent circumstances exception. Id. at 2494.
The Riley decision also addressed the government’s concerns about officer safety and the
potential loss or destruction of evidence in particular cases. Id. at 2485-89. As to the first
concern, the Court made clear that law enforcement officers “remain free to examine the physical
aspects of a phone to ensure that it will not be used as a weapon—say, to determine whether
there is a razor blade hidden between the phone and its case.” Id. at 2485. As to the latter
concern, preventing the destruction of evidence, the Court reasoned that “law enforcement is not
without specific means to address the threat.” Id. at 2487. For instance, the Court stated that
remote wiping could be prevented by disconnecting the phone from the network, either by
turning the phone off, removing its battery, or placing it in a Faraday bag. Id. (also noting, in the
event that officers seize a phone in an unlocked state, that they may be able to disable the
phone’s locking mechanism as a preventative measure under McArthur, which approved of
officers’ reasonable steps to secure a scene and preserve evidence while they awaited a warrant).
Analysis
Defendant Bell’s Motion argues that Officer Sinks conducted an unconstitutional search
when he opened Bell’s phone. The government’s response contends that Officer Sinks’ conduct
did not amount to a search because the photograph of the firearm was in plain view, and “Riley
specifically approved of this procedure and authorize[d] the officer to do exactly what he did.”
1) Whether Opening Bell’s Phone Constituted a Search
The government’s response to Bell’s Motion asserts that Officer Sinks’ opening of the flip
phone did not constitute a search. While it is true that a “cursory inspection—one that involves
merely looking at what is already exposed to view, without disturbing it—is not a ‘search’ for
4
1:15-cr-10029-JES-JEH # 71 Page 4 of 16
Fourth Amendment purposes,” Officer Sinks’ opening of Bell’s cell phone exceeded a “cursory
inspection” because he exposed to view concealed portions of the object—i.e., the screen. See
Arizona v. Hicks, 480 U.S. 321, 328-29 (1987). The Supreme Court specifically addressed this
issue in Hicks, noting that the “distinction between ‘looking’ at a suspicious object in plain view
and ‘moving’ it even a few inches is much more than trivial for purposes of the Fourth
Amendment.” Id. at 325. Officer Sinks’ opening of the flip phone, like the officer moving the
stereo equipment in Hicks, “exposed to view concealed portions of the [object]” and thus
“produced a new invasion of [defendant’s] privacy.” See Hicks, 480 U.S. at 324 (reasoning that
“[a] search is a search, even if it happens to disclose nothing but the bottom of a turntable”).
Likewise, because Officer Sinks had to manipulate the phone to view the picture on the
screen, that picture was by definition not in “plain view.” See Hicks, 480 U.S. at 326; see also
United States v. Venegas, 594 Fed. App’x. 822, 825 (5th Cir. 2014) (“Because Deputy Villegas
had to manipulate the phone to view the photograph, however, we are hesitant to conclude that
the photograph was within Deputy Villegas’s plain view.”). The government’s assertion that “the
defendant’s cell phone was lawfully seized” also misses the point. Although the police officers
were justified in searching his person and seizing his personal effects upon his arrest, Riley made
clear that “while Robinson’s categorical rule [for searches incident to arrest] strikes the
appropriate balance in the context of physical objects,” “a warrant is generally required before [a
cell phone] search, even when a cell phone is seized incident to arrest.” Riley, 134 S.Ct. at 2484,
2493.
Here, Officer Sinks’ search of Bell’s cell phone was limited to viewing the home screen.
He did not rummage through videos, photos, contacts and call logs like the officers who searched
Riley’s cell phone. Riley, 134 S.Ct. at 2480-81. The search of Bell’s cell phone was also less
5
1:15-cr-10029-JES-JEH # 71 Page 5 of 16
intrusive than the search of Wurie’s flip phone. Id. at 2481 (in the companion case to Riley, the
officers opened Wurie’s phone after it repeatedly rang, observed the home screen picture of a
woman and a baby, opened the call log, and found the number associated with the incoming
calls). It is also possible that Bell has a lesser privacy interest in the information contained on the
home screen of his cell phone than he does on information stored elsewhere on the device. For
example, in United States v. Concepcion, the Seventh Circuit held that although Concepcion had
a privacy interest in the keyhole of an apartment door lock sufficient to make the inspection of
the lock a “search,” “the privacy interest [was] so small that the officers [did] not need probable
cause to inspect it.” 942 F.2d 1170, 1173 (7th Cir. 1991). Concepcion distinguished the lock from
the turntable in Hicks, reasoning that “[w]hat the officers learned from inverting the turntable in
Hicks they could not have come by in any other way; these agents thus invaded less of
Concepcion’s interest in security of information when they used the key to verify his address.”
Id.
However, Concepcion is distinguishable from Riley because searches of information
stored on cell phones implicate privacy interests that necessitate stronger protections against
warrantless searches compared to the physical objects envisioned in Robinson. See Riley, 134
S.Ct. at 2478 (noting that searches of an arrestee’s pockets “works no substantial additional
intrusion on privacy beyond the arrest itself,” for physical items, but “more substantial privacy
interests are at stake when digital data is involved”). The lens through which all information on a
cell phone is observed is the screen. On both flip phones and more modern, advanced devices,
“notifications” are regularly displayed on the home screen or lock screen indicating text
messages, missed calls, and other alerts. The position that the government advances here—that
officers can always open a phone and look at the screen to turn the phone off without conducting
6
1:15-cr-10029-JES-JEH # 71 Page 6 of 16
a “search” at all—is inconsistent with Riley’s requirement that “unlike the search incident to
arrest exception, the exigent circumstances exception requires a court to examine whether an
emergency justified a warrantless search in each particular case.” Id. at 2494. Just as Riley
analyzed and rejected California’s attempt to create across the board exceptions, such as a rule
allowing police to search call logs, without a warrant, the Court sees no reason to allow law
enforcement to circumvent the warrant requirement in every case under the guise that they
discovered evidence when they opened the phone or turned on the screen to turn the phone off.
Furthermore, “[a] series of opinions allowing some cell phone searches but not others,
based on the nature and reasonableness of the intrusion, would create exactly the ‘inherently
subjective and highly fact specific’ set of rules that the Court has warned against and would be
extremely difficult for officers in the field to apply.” United States v. Wurie, 728 F.3d 1, 12-13
(1st Cir. 2013) aff’d sub nom. Riley v. California, 134 S.Ct 2473 (2014). The prescient Wurie
opinion warned of the justification offered by the government here, noting that “[a] rule based on
particular instances in which the police do not take full advantage of the unlimited potential
presented by cell phone data searches would prove impotent in those cases in which they choose
to exploit that potential.” Having determined that a search occured, whether Officer Sinks’
warrantless search of Bell’s cell phone was permissible depends on whether an exception to the
general rule justified the warrantless search.
2) Whether the Warrantless Search was Reasonable: Exigent Circumstances
“In the absence of a warrant, a search is reasonable only if it falls within a specific
exception to the warrant requirement.” Riley, 134 S.Ct. at 2482, quoting Kentucky v. King, 563
U.S. 452, 459 (2011). One such exception is for exigent circumstances, where “the exigencies of
the situation make the needs of law enforcement so compelling that a warrantless search is
7
1:15-cr-10029-JES-JEH # 71 Page 7 of 16
objectively reasonable under the Fourth Amendment.” King, 563 U.S. at 459. Here, two such
exigencies are relevant: harm to officers and destruction of evidence. See Chimel v. California,
395 U.S. 752 (1969).
a) Officer Safety
Digital data stored on a cell phone cannot itself be used as a weapon to
harm an arresting officer or to effectuate the arrestee's escape. Law enforcement
officers remain free to examine the physical aspects of a phone to ensure that it
will not be used as a weapon—say, to determine whether there is a razor blade
hidden between the phone and its case. Once an officer has secured a phone and
eliminated any potential physical threats, however, data on the phone can
endanger no one.
Riley v. California, 134 S. Ct. 2473, 2485 (2014).
The Court in Riley acknowledged the possibility that a cell phone could conceal weapons
such as a razor blade, but reasoned that such possibility does not “justify dispensing with the
warrant requirement across the board.” Id. at 2486. Rather, “[t]o the extent dangers to arresting
officers may be implicated in a particular way in a particular case, they are better addressed
through consideration of case-specific exceptions to the warrant requirement, such as the one for
exigent circumstances.” Id. The government’s response to Defendant’s Motion largely parrots the
exigent circumstances hypotheticals offered by the Court in Riley. See E.C.F. Doc 60, at 8
(“Phones may also have been physically altered in a way that poses a risk to officer safety . . .
[a]lthough the Court in Riley did not consider these risks to be sufficient to justify routine
warrantless searches of a phone’s contents, it approved of law enforcement taking reasonable
steps to protect themselves and preserve data while a warrant is sought.”). The problem with the
government’s argument is that it does not claim that the officer searched the phone because he
was actually concerned for his safety. And because the search of Bell’s phone occurred while
Bell was in custody at the police station, such a concern would either be remote or entirely
8
1:15-cr-10029-JES-JEH # 71 Page 8 of 16
absent. Since Riley recognized case-specific exceptions to the warrant requirement when
“dangers to arresting officers may be implicated in a particular way in a particular case,” it
follows that the concern for officer safety must actually be present in the particular case in order
for the exception to apply. Riley, 134. S.Ct. at 2486. No such facts are present here; thus, officer
safety does not justify the search.
b) Preventing Destruction of Evidence
Exigent circumstances may also justify law enforcement efforts to prevent the destruction
of evidence when officers have specific concerns about the potential loss of evidence in a
particular case. Id. at 2487; Chimel v. California, 395 U.S. 752, 764 (1969). As the Court in Riley
acknowledged, information stored on cell phones may be vulnerable to remote wiping, where the
cell phone’s owner or a third party can send a wireless signal that erases the data stored on the
device. Riley, 134 S.Ct. at 2486-87 (the Court noted, however, that it has “little reason to
believe” that remote wiping is prevalent). The Riley Opinion offered a number of solutions to
address situations where law enforcement officers suspect that someone may attempt to erase the
information stored on a seized device:
In any event, as to remote wiping, law enforcement is not without specific means
to address the threat. Remote wiping can be fully prevented by disconnecting a
phone from the network. There are at least two simple ways to do this: First, law
enforcement officers can turn the phone off or remove its battery. Second, if they
are concerned about encryption or other potential problems, they can leave a
phone powered on and place it in an enclosure that isolates the phone from radio
waves. . . .
To the extent that law enforcement still has specific concerns about the potential
loss of evidence in a particular case, there remain more targeted ways to address
those concerns. If “the police are truly confronted with a ‘now or never’
situation,”—for example, circumstances suggesting that a defendant's phone will
be the target of an imminent remote-wipe attempt—they may be able to rely on
exigent circumstances to search the phone immediately. Missouri v. McNeely,133
S.Ct. 1552, 1561–1562 (2013). Or, if officers happen to seize a phone in an
unlocked state, they may be able to disable a phone's automatic-lock feature in
9
1:15-cr-10029-JES-JEH # 71 Page 9 of 16
order to prevent the phone from locking and encrypting data. Such a preventive
measure could be analyzed under the principles set forth in our decision in
McArthur, 531 U.S. 326, which approved officers' reasonable steps to secure a
scene to preserve evidence while they awaited a warrant.
Riley v. California, 134 S. Ct. 2473, 2487-88 (2014) (some citations omitted).
Again, the problem with the government’s argument is that it does not claim the arresting
officer searched the phone because he was actually concerned that data on Bell’s cell phone
risked destruction by remote wiping. Although Riley did not offer specific guidance as to how
courts should scrutinize law enforcement’s claims alleging concern for officer safety or
destruction of evidence, the Riley Opinion was clear that exigent circumstances must actually be
present “in each particular case” in order for the exception to the warrant requirement to apply.
Id. at 2494 (“The critical point is that, unlike the search incident to arrest exception, the exigent
circumstances exception requires a court to examine whether an emergency justified a
warrantless search in each particular case.”)(emphasis added).
The government’s response appears to concede as much, stating that “the Court in Riley
did not consider these risks to be sufficient to justify routine warrantless searches of a phone’s
contents,” but goes on to state that the Court “approved of law enforcement officers taking
reasonable steps to protect themselves and to preserve data while a warrant is sought.” Yet
neither the government’s response, nor the warrant affidavit, asserted that the officer in this case
opened Bell’s cell phone out of a concern for officer safety or preservation of evidence. And
without that nexus, the officer’s search of Bell’s cell phone amounted to the very “routine
warrantless search” that the government’s response acknowledges Riley proscribed.
Lastly, the statement in the government’s response that Officer Sinks opened the phone
“following his training and standard procedure” is inconsistent with testimony elicited from
Sinks and other officers at the suppression hearing. See E.C.F. Doc. 60, at 5. At the hearing,
10
1:15-cr-10029-JES-JEH # 71 Page 10 of 16
Sinks testified that department procedures instructed officers to remove the battery once a phone
is seized, but stated that no one had briefed him on Bell’s status and he did not believe Bell’s
phone had been “seized” at that point. Although the Court believes the facts indicate the phone
was seized—Bell was arrested pursuant to an arrest warrant, he was in custody at the Peoria
Police Department and his phone was taken from his person—Officer Sinks’ belief regarding
when the phone was seized does not change the analysis. Officer Sinks also testified that he
typically powers a phone off to avoid any distractions, and if Bell were to be released the phone
would be returned to him. Agent Nixon testified that he wanted to seize the phone but had not yet
informed Sinks of his intention to do so. Officer Feehan testified that the policy was put in place
partly because snooping software could be used to listen in on conversations when the phone is
turned off but still connected to the battery, and other methods could “compromise data” on the
phone. While the procedure may be outdated as applied to modern cell phones that lack
removable batteries, that problem was not present here, and the video later showed Officer Sinks
removing the battery. Where officers have two equally effective options to turn off a phone, they
should choose the less intrusive option. That was not done in this case, and as a result,
incriminating evidence was found.
In sum, the testimony surrounding the department policies and procedures for handling
Bell’s cell phone further supports the Court’s conclusion that the search was unlawful. The
government has not demonstrated the presence of exigent circumstances in this particular case;
thus, Riley’s general rule prohibiting warrantless searches of cell phones applies. The search of
Bell’s cell phone violated the Fourth Amendment prohibition against unreasonable searches and
seizures.
11
1:15-cr-10029-JES-JEH # 71 Page 11 of 16
3) The April and October 2015 Search Warrants
The Defendant also moves to suppress any evidence obtained from the April and October
search warrants on the grounds that the warrants were not supported by probable cause.
Specifically, Defendant argues that: (1) the affidavit submitted in support of the warrant
application relied on a confidential source who did not testify before the issuing judge and whose
reliability was not established; (2) the recording and transcripts were not provided to the issuing
judge; (3) the affidavit does not state whether the confidential source or the theft victim
confirmed that the firearm depicted in the photograph was the same firearm that was stolen and
later sold to the Defendant; and (4) the affidavit does not state the telephone number associated
with the February 25, 2015 picture message was the same number as the one assigned to the cell
phone seized from Defendant. The application for warrant contains a paragraph reciting Officer
Sinks’ observation of the picture on the home screen of Bell’s cell phone. See E.C.F. Doc 53, Ex.
3, at 3.
The government’s response argues that: (1) the officer did not run afoul of the Fourth
Amendment when he opened Bell’s cell phone before obtaining a warrant; thus, the paragraph in
the warrant application should not be stricken; and (2) even if the paragraph was stricken, the
affidavit sufficed to establish probable cause to grant the warrant. As discussed above, the
officer’s opening of Bell’s cell phone constituted a search in violation of the Fourth Amendment.
Thus, the Court cabins its analysis to the government’s alternative argument—whether the
warrants were supported by probable cause absent the offending paragraph.
The following statements are taken from the April, 2015 affidavit in support of warrant.
An AK-47 style rifle was stolen from a Pekin resident’s home, and that the resident suspected
C/S-1 was responsible for the burglary. C/S-1 confessed to the burglary as part of a proffer
12
1:15-cr-10029-JES-JEH # 71 Page 12 of 16
agreement after C/S-1 had been arrested on charges related to the manufacture of
methamphetamine. The confidential source advised law enforcement that he sold the firearms to
a drug dealer by the street name “Jay” for cocaine and money. C/S-1 provided assistance to the
FBI and Illinois State Police, including participating in a controlled buy of small amounts of
cocaine from “Jay” where both video and photographs were taken. On February 17, 2015, SA
Nixon interviewed an inmate at the Peoria County Jail. The inmate was shown portions of the
video and a photograph from the controlled buy and immediately recognized the individual as
Demontae Bell, stating his confidence was a “ten” on a one-to-ten scale.
After the interview, SA Nixon showed an unmarked booking picture of Demontae Bell to
C/S-1, who positively identified the individual as “Jay.” SA Nixon ran a query of Bell’s criminal
history and observed that bell was arrested in 2002 for charges relating to delivery of a controlled
substance and the felony sentence disposition stated “3 years.” On February 25, 2015, a second
controlled buy with C/S-1 and Bell was conducted using a concealed audio/video recording
device. During the purchase, Bell entered C/S-1’s vehicle and discussed C/S-1’s attempts to
locate magazines for the stolen AK-47. The recording confirmed that Bell told C/S-1 that he had
sold the AK-47. The video recording also depicted Bell informing C/S-1 that he had a picture of
the AK-47 on his phone and sending that picture to C/S-1 from his cell phone, which SA Nixon
later viewed.1
An affidavit must provide the magistrate with a substantial basis for determining the
existence of probable cause. Illinois v. Gates, 462 U.S. 213, 239 (1983). When an affidavit is the
only evidence presented to a judge in support of a search warrant, the warrant’s validity rests solely
on the strength of the affidavit. United States v. Peck, 317 F.3d 754, 756 (2003). When analyzing the
1
At the hearing, Bell’s attorney stated that additional information was omitted from the affidavit that would have
negated the existence of probable cause necessary to secure a warrant. That evidence is not before the Court at this
time and was not considered.
13
1:15-cr-10029-JES-JEH # 71 Page 13 of 16
credibility of an informant, a court considers: (1) the personal observations of the informant, (2) the
degree of detail given in the affidavit, (3) independent police corroboration of the information, (4) the
interval of time between the events and the application for a warrant, and (5) whether the informant
testified at the probable cause hearing. Id. A deficiency in one factor may be compensated by strength
in another or some other indication of reliability. Id. A facially valid warrant issued by a neutral,
detached magistrate will be upheld if the police relied on the warrant in good faith. See United States
v. Leon, 468 U.S. 897, 915 (1984).
Here, the issuing judge had a substantial basis for determining the existence of probable
cause, and omitting the offending paragraph about the officer opening the phone does not alter
that conclusion. Defendant argues that the affidavit in support of the warrant relied on a
confidential source who did not testify in front of the issuing judge, and who cooperated with
law enforcement as part of a proffer agreement for drug charges. True, but the veracity of an
informant is only one factor among many that Courts consider when making a probable cause
determination. See Gates, 462 U.S. at 238. And while veracity, reliability, and basis of
knowledge are highly relevant, those considerations should not “be understood as entirely
separate and independent requirements to be rigidly drawn in every case.” Id. at 230. Moreover,
“[t]he reliability or veracity of an informant in a particular case can also be shown by
corroboration of the information he provides through independent police investigation.” United
States v. Mitten, 592 F.3d 767, 774 (7th Cir. 2010). The fact that the confidential source was
“motivated by a desire to lessen the consequences [he] would likely suffer for [his] own crimes .
. . does not make the information [he] provide[d] inherently unreliable.” Id. (quoting United
States v. Olson, 408 F.3d 366, 371 (7th Cir. 2005)).
Here, the confidential source was implicated by the victim of the firearm burglary, who
the victim believed had knowledge of his gun collection and sold guns. When law enforcement
14
1:15-cr-10029-JES-JEH # 71 Page 14 of 16
interviewed C/S-1, he admitted he sold the guns to a Peoria drug dealer with the alias “Jay.” A
separate informant confirmed that “Jay” was Demontae Bell. A search of Bell’s criminal history
revealed that he had a prior felony conviction for delivery of a controlled substance. The two
controlled purchases between Bell and C/S-1 were recorded. The affidavit summarizes
(accurately) the conversations between Bell and C/S-1, including admissions by Bell that he sold
the AK-47. Significantly, the affidavit states, and the transcript supports, the fact that Bell used
his cell phone to send C/S-1 a picture of the firearm, and that SA Nixon viewed the picture on
C/S-1’s phone shortly after it was sent.
From these facts, the affidavit submitted in support of the warrant application provided
detailed, collaborated information from which the issuing judge reasonably concluded there was
a fair probability that contraband or evidence of a crime would be found on Defendant’s cell
phone. Gates, 462 U.S. at 238. Omitting the reference to the officer opening the phone does not
alter the probable cause determination. Moreover, the picture of the AK-47 on Bell’s cell phone
was not discovered inadvertently through the warrantless search. Rather, it was the same picture
Bell sent to C/S-1 and SA Nixon viewed. Because the officers knew that Bell had a picture of the
gun on his phone before the search ever took place, the independent source doctrine applies. See
Nix v. Williams, 467 U.S. 431, 443 (1984). Under the independent source doctrine, the police are
put “in the same, not a worse, position than they would have been if no police error or
misconduct had occurred.” Id. Here, if Officer Sinks had not opened Bell’s phone, the photo
would have ultimately been discovered because the officers knew that Bell had the photo on his
phone.
Lastly, the second search warrant was almost identical to the first, except that it replaced
the offending paragraph about Officer Sinks opening the phone with a statement that the picture
15
1:15-cr-10029-JES-JEH # 71 Page 15 of 16
was found when the first warrant was executed. Therefore, the search warrants were adequately
supported by probable cause and the photo and associated data will not be suppressed.
CONCLUSION
For the reasons stated above, Defendant’s Motion to Suppress is DENIED. This matter
remains set for pretrial conference on May 5, 2016.
Signed on this 20th day of April, 2016.
s/ James E. Shadid
James E. Shadid
United States District Judge
16
1:15-cr-10029-JES-JEH # 71 Page 16 of 16

Weitere ähnliche Inhalte

Was ist angesagt?

Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716Deborah Dickson
 
BRIEF IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONS
BRIEF  IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONSBRIEF  IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONS
BRIEF IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONSAlvin Sutherlin, Jr
 
Adam Kunz and Ed Magedson hard at work
Adam Kunz and Ed Magedson hard at workAdam Kunz and Ed Magedson hard at work
Adam Kunz and Ed Magedson hard at workpaladinpi
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-twoscreaminc
 
UNITED STATES V. NIXON
UNITED STATES V. NIXONUNITED STATES V. NIXON
UNITED STATES V. NIXONMegan James
 
Pitchess motion belvin
Pitchess motion belvinPitchess motion belvin
Pitchess motion belvinaltis Peoples
 
Darren Chaker Fourth Amendment Order
Darren Chaker Fourth Amendment OrderDarren Chaker Fourth Amendment Order
Darren Chaker Fourth Amendment OrderDarren Chaker
 
Legalization of marijuana
Legalization of marijuana Legalization of marijuana
Legalization of marijuana HandMadeWritings
 
Ex cia officer v do j on covert merlin agent
Ex cia officer v do j on covert merlin agentEx cia officer v do j on covert merlin agent
Ex cia officer v do j on covert merlin agentAnonDownload
 
United states v. nixon
United states  v. nixonUnited states  v. nixon
United states v. nixonxsportz28
 
Legal Writing Assignment 2
Legal Writing Assignment 2Legal Writing Assignment 2
Legal Writing Assignment 2Chad Jenkins
 
Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716Deborah Dickson
 
Criminal_Appeal_631_of_2010
Criminal_Appeal_631_of_2010Criminal_Appeal_631_of_2010
Criminal_Appeal_631_of_2010John Ramsey
 
writing sample - criminal
writing sample - criminalwriting sample - criminal
writing sample - criminalBryan Coignet
 

Was ist angesagt? (19)

Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Motion_in_Limine_060716
 
BRIEF IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONS
BRIEF  IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONSBRIEF  IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONS
BRIEF IN SUPPORT OF AMENDED PLAINTIFF’S MOTION TO COMPEL WITH SANCTIONS
 
Edward abdalla guilty
Edward abdalla guiltyEdward abdalla guilty
Edward abdalla guilty
 
Adam Kunz and Ed Magedson hard at work
Adam Kunz and Ed Magedson hard at workAdam Kunz and Ed Magedson hard at work
Adam Kunz and Ed Magedson hard at work
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
 
United States v Nixon
United States v NixonUnited States v Nixon
United States v Nixon
 
UNITED STATES V. NIXON
UNITED STATES V. NIXONUNITED STATES V. NIXON
UNITED STATES V. NIXON
 
Pitchess motion belvin
Pitchess motion belvinPitchess motion belvin
Pitchess motion belvin
 
(4) section 7
(4) section 7(4) section 7
(4) section 7
 
Darren Chaker Fourth Amendment Order
Darren Chaker Fourth Amendment OrderDarren Chaker Fourth Amendment Order
Darren Chaker Fourth Amendment Order
 
Legalization of marijuana
Legalization of marijuana Legalization of marijuana
Legalization of marijuana
 
Ex cia officer v do j on covert merlin agent
Ex cia officer v do j on covert merlin agentEx cia officer v do j on covert merlin agent
Ex cia officer v do j on covert merlin agent
 
United states v. nixon
United states  v. nixonUnited states  v. nixon
United states v. nixon
 
(3) res gestae
(3) res gestae(3) res gestae
(3) res gestae
 
McRae-Capstone
McRae-CapstoneMcRae-Capstone
McRae-Capstone
 
Legal Writing Assignment 2
Legal Writing Assignment 2Legal Writing Assignment 2
Legal Writing Assignment 2
 
Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716
Dickson_Davis_Deborah_Sample_Writing_Memorandum_of_Law_Motion_in_Limine_060716
 
Criminal_Appeal_631_of_2010
Criminal_Appeal_631_of_2010Criminal_Appeal_631_of_2010
Criminal_Appeal_631_of_2010
 
writing sample - criminal
writing sample - criminalwriting sample - criminal
writing sample - criminal
 

Andere mochten auch

Darren Chaker Judicial Notice Motion
Darren Chaker Judicial Notice MotionDarren Chaker Judicial Notice Motion
Darren Chaker Judicial Notice MotionDarren Chaker
 
Darren Chaker Victory in Texas
Darren Chaker Victory in TexasDarren Chaker Victory in Texas
Darren Chaker Victory in TexasDarren Chaker
 
Federal Lawsuit San Diego Police Darren Chaker
Federal Lawsuit San Diego Police Darren ChakerFederal Lawsuit San Diego Police Darren Chaker
Federal Lawsuit San Diego Police Darren ChakerDarren Chaker
 
Darren Chaker Prior Restraint First Amendment
Darren Chaker Prior Restraint First AmendmentDarren Chaker Prior Restraint First Amendment
Darren Chaker Prior Restraint First AmendmentDarren Chaker
 
ACLU Darren Chaker Privacy Brief
ACLU Darren Chaker Privacy BriefACLU Darren Chaker Privacy Brief
ACLU Darren Chaker Privacy BriefDarren Chaker
 
Privacy Law Update Darren Chaker
Privacy Law Update Darren ChakerPrivacy Law Update Darren Chaker
Privacy Law Update Darren ChakerDarren Chaker
 
First Amendment Darren Chaker
First Amendment Darren ChakerFirst Amendment Darren Chaker
First Amendment Darren ChakerDarren Chaker
 

Andere mochten auch (8)

Darren Chaker Judicial Notice Motion
Darren Chaker Judicial Notice MotionDarren Chaker Judicial Notice Motion
Darren Chaker Judicial Notice Motion
 
Darren Chaker Victory in Texas
Darren Chaker Victory in TexasDarren Chaker Victory in Texas
Darren Chaker Victory in Texas
 
Federal Lawsuit San Diego Police Darren Chaker
Federal Lawsuit San Diego Police Darren ChakerFederal Lawsuit San Diego Police Darren Chaker
Federal Lawsuit San Diego Police Darren Chaker
 
FOIA darren chaker
FOIA darren chakerFOIA darren chaker
FOIA darren chaker
 
Darren Chaker Prior Restraint First Amendment
Darren Chaker Prior Restraint First AmendmentDarren Chaker Prior Restraint First Amendment
Darren Chaker Prior Restraint First Amendment
 
ACLU Darren Chaker Privacy Brief
ACLU Darren Chaker Privacy BriefACLU Darren Chaker Privacy Brief
ACLU Darren Chaker Privacy Brief
 
Privacy Law Update Darren Chaker
Privacy Law Update Darren ChakerPrivacy Law Update Darren Chaker
Privacy Law Update Darren Chaker
 
First Amendment Darren Chaker
First Amendment Darren ChakerFirst Amendment Darren Chaker
First Amendment Darren Chaker
 

Ähnlich wie Privacy Court Opinion Darren Chaker

Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docxRiley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docxjoellemurphey
 
Lockport child porn search warrant
Lockport child porn search warrantLockport child porn search warrant
Lockport child porn search warrantEileenBuckley
 
196837202 cases-rule-126
196837202 cases-rule-126196837202 cases-rule-126
196837202 cases-rule-126homeworkping3
 
Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9mpalaro
 
Pick two of the types of criminal acts discussed in the readings and.docx
Pick two of the types of criminal acts discussed in the readings and.docxPick two of the types of criminal acts discussed in the readings and.docx
Pick two of the types of criminal acts discussed in the readings and.docxrowthechang
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3Mike Wilkie
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3Mike Wilkie
 
Case Brief InstructionsYou will prepare a Case Brief on th.docx
Case Brief InstructionsYou will prepare a Case Brief on th.docxCase Brief InstructionsYou will prepare a Case Brief on th.docx
Case Brief InstructionsYou will prepare a Case Brief on th.docxmichelljubborjudd
 
State of Louisiana v Sonny Barker_Objective Memo_FINAL_11_30_14
State of Louisiana v  Sonny Barker_Objective Memo_FINAL_11_30_14State of Louisiana v  Sonny Barker_Objective Memo_FINAL_11_30_14
State of Louisiana v Sonny Barker_Objective Memo_FINAL_11_30_14Joni Schultz
 
Appellate Brief Sp16 1114
Appellate Brief Sp16 1114Appellate Brief Sp16 1114
Appellate Brief Sp16 1114Braden Asper
 
Appellate Brief Moot Court 2014. docx
Appellate Brief Moot Court 2014. docxAppellate Brief Moot Court 2014. docx
Appellate Brief Moot Court 2014. docxJose Gerez
 
Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7mpalaro
 
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0httphttpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0httpLizbethQuinonez813
 
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALChapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALLisa Greene
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramJoseph V. Moreno
 

Ähnlich wie Privacy Court Opinion Darren Chaker (20)

Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docxRiley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
 
Lockport child porn search warrant
Lockport child porn search warrantLockport child porn search warrant
Lockport child porn search warrant
 
196837202 cases-rule-126
196837202 cases-rule-126196837202 cases-rule-126
196837202 cases-rule-126
 
Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9
 
Pick two of the types of criminal acts discussed in the readings and.docx
Pick two of the types of criminal acts discussed in the readings and.docxPick two of the types of criminal acts discussed in the readings and.docx
Pick two of the types of criminal acts discussed in the readings and.docx
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3
 
Case Brief InstructionsYou will prepare a Case Brief on th.docx
Case Brief InstructionsYou will prepare a Case Brief on th.docxCase Brief InstructionsYou will prepare a Case Brief on th.docx
Case Brief InstructionsYou will prepare a Case Brief on th.docx
 
State of Louisiana v Sonny Barker_Objective Memo_FINAL_11_30_14
State of Louisiana v  Sonny Barker_Objective Memo_FINAL_11_30_14State of Louisiana v  Sonny Barker_Objective Memo_FINAL_11_30_14
State of Louisiana v Sonny Barker_Objective Memo_FINAL_11_30_14
 
pleading argument
pleading argumentpleading argument
pleading argument
 
Appellate Brief Sp16 1114
Appellate Brief Sp16 1114Appellate Brief Sp16 1114
Appellate Brief Sp16 1114
 
Appellate Brief Moot Court 2014. docx
Appellate Brief Moot Court 2014. docxAppellate Brief Moot Court 2014. docx
Appellate Brief Moot Court 2014. docx
 
Essay On 4Th Amendment
Essay On 4Th AmendmentEssay On 4Th Amendment
Essay On 4Th Amendment
 
Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7
 
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0httphttpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
 
4Th Amendment Essay
4Th Amendment Essay4Th Amendment Essay
4Th Amendment Essay
 
4Th Amendment Essay
4Th Amendment Essay4Th Amendment Essay
4Th Amendment Essay
 
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALChapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
 
(6) section 9
(6) section 9(6) section 9
(6) section 9
 
On Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance ProgramOn Overview of the NSA's Surveillance Program
On Overview of the NSA's Surveillance Program
 

Mehr von Darren Chaker

Scott McMillan San Diego Attorney Sanctions
Scott McMillan San Diego Attorney SanctionsScott McMillan San Diego Attorney Sanctions
Scott McMillan San Diego Attorney SanctionsDarren Chaker
 
Scott McMillan v Darren Chaker RICO
Scott McMillan v Darren Chaker RICOScott McMillan v Darren Chaker RICO
Scott McMillan v Darren Chaker RICODarren Chaker
 
Scott McMillan San Diego Attorney Loss
Scott McMillan San Diego Attorney LossScott McMillan San Diego Attorney Loss
Scott McMillan San Diego Attorney LossDarren Chaker
 
San Diego Scott McMillan Attorney Sanctions
San Diego Scott McMillan Attorney SanctionsSan Diego Scott McMillan Attorney Sanctions
San Diego Scott McMillan Attorney SanctionsDarren Chaker
 
Scott Mcmillan San Diego Attorney
Scott Mcmillan San Diego AttorneyScott Mcmillan San Diego Attorney
Scott Mcmillan San Diego AttorneyDarren Chaker
 
Darren Chaker blog brief
Darren Chaker blog briefDarren Chaker blog brief
Darren Chaker blog briefDarren Chaker
 
Darren Chaker First Amendment
Darren Chaker First AmendmentDarren Chaker First Amendment
Darren Chaker First AmendmentDarren Chaker
 
Scott McMillan San Diego Attorney
Scott McMillan San Diego AttorneyScott McMillan San Diego Attorney
Scott McMillan San Diego AttorneyDarren Chaker
 
Scott McMillan La Mesa Faces Sanctions for Lying to Court
Scott McMillan La Mesa Faces Sanctions for Lying to CourtScott McMillan La Mesa Faces Sanctions for Lying to Court
Scott McMillan La Mesa Faces Sanctions for Lying to CourtDarren Chaker
 
EFF Brief Darren Chaker
EFF Brief Darren ChakerEFF Brief Darren Chaker
EFF Brief Darren ChakerDarren Chaker
 
Darren Chaker First Amendment Brief
Darren Chaker First Amendment BriefDarren Chaker First Amendment Brief
Darren Chaker First Amendment BriefDarren Chaker
 
Darren Chaker Privacy Brief
Darren Chaker Privacy BriefDarren Chaker Privacy Brief
Darren Chaker Privacy BriefDarren Chaker
 
Scott Mcmillan law firm la mesa
Scott Mcmillan law firm la mesaScott Mcmillan law firm la mesa
Scott Mcmillan law firm la mesaDarren Chaker
 

Mehr von Darren Chaker (14)

Scott McMillan San Diego Attorney Sanctions
Scott McMillan San Diego Attorney SanctionsScott McMillan San Diego Attorney Sanctions
Scott McMillan San Diego Attorney Sanctions
 
Scott McMillan v Darren Chaker RICO
Scott McMillan v Darren Chaker RICOScott McMillan v Darren Chaker RICO
Scott McMillan v Darren Chaker RICO
 
Scott McMillan San Diego Attorney Loss
Scott McMillan San Diego Attorney LossScott McMillan San Diego Attorney Loss
Scott McMillan San Diego Attorney Loss
 
San Diego Scott McMillan Attorney Sanctions
San Diego Scott McMillan Attorney SanctionsSan Diego Scott McMillan Attorney Sanctions
San Diego Scott McMillan Attorney Sanctions
 
Scott Mcmillan San Diego Attorney
Scott Mcmillan San Diego AttorneyScott Mcmillan San Diego Attorney
Scott Mcmillan San Diego Attorney
 
Darren Chaker blog brief
Darren Chaker blog briefDarren Chaker blog brief
Darren Chaker blog brief
 
Darren Chaker First Amendment
Darren Chaker First AmendmentDarren Chaker First Amendment
Darren Chaker First Amendment
 
Darren chaker brief
Darren chaker briefDarren chaker brief
Darren chaker brief
 
Scott McMillan San Diego Attorney
Scott McMillan San Diego AttorneyScott McMillan San Diego Attorney
Scott McMillan San Diego Attorney
 
Scott McMillan La Mesa Faces Sanctions for Lying to Court
Scott McMillan La Mesa Faces Sanctions for Lying to CourtScott McMillan La Mesa Faces Sanctions for Lying to Court
Scott McMillan La Mesa Faces Sanctions for Lying to Court
 
EFF Brief Darren Chaker
EFF Brief Darren ChakerEFF Brief Darren Chaker
EFF Brief Darren Chaker
 
Darren Chaker First Amendment Brief
Darren Chaker First Amendment BriefDarren Chaker First Amendment Brief
Darren Chaker First Amendment Brief
 
Darren Chaker Privacy Brief
Darren Chaker Privacy BriefDarren Chaker Privacy Brief
Darren Chaker Privacy Brief
 
Scott Mcmillan law firm la mesa
Scott Mcmillan law firm la mesaScott Mcmillan law firm la mesa
Scott Mcmillan law firm la mesa
 

Kürzlich hochgeladen

Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理A AA
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptRRR Chambers
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 

Kürzlich hochgeladen (20)

Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 

Privacy Court Opinion Darren Chaker

  • 1. UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF ILLINOIS UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) v. ) Case No. 15-10029 ) DEMONTAE BELL, ) ) Defendant. ) ORDER AND OPINION This matter is now before the Court on Defendant Demontae Bell’s Amended Motion [53] to Suppress. For the reasons set forth below, Defendant’s Motion is DENIED. Background On November 6, 2014, the Pekin Police Department responded to a report of a burglary where a Glock pistol, two AR-15 style rifles, and an AK-47 style rifle were stolen from a residential building in Pekin, Illinois. The resident reported a name to the police who he believed stole the firearms. The police interviewed that person, “C/S-1,” who had been arrested on charges related to the manufacture of methamphetamine. C/S-1 admitted to stealing the firearms, and told the police that he sold them in Peoria to a drug dealer known as “Jay” for money and cocaine. After the interview, the informant began working with the FBI and Illinois State Police as part of a proffer agreement in order to recover the firearms. The agents and C/S-1 arranged a controlled purchase of a small amount of cocaine from “Jay,” where video and photographs were taken of the suspect. Later, an FBI agent interviewed an inmate at Peoria County Jail. After the agent showed the inmate portions of the video and photos taken during the controlled buy, the inmate recognized Defendant as Demontae Bell. The agent accessed the Peoria County Jail’s 1 E-FILED Wednesday, 20 April, 2016 12:40:12 PM Clerk, U.S. District Court, ILCD 1:15-cr-10029-JES-JEH # 71 Page 1 of 16
  • 2. online record system after the interview and printed a photo of Bell without any identifiers. When the agent showed the photo to C/S-1, the informant identified the individual in the photo as Demontae Bell. On February 23, 2015, the FBI agent searched Bell’s criminal history and found a prior felony conviction for delivery of controlled substances. On February 25, 2015, the FBI and State Police conducted a second controlled buy of cocaine from Bell, again recording audio and video of the transaction. Bell entered C/S-1’s vehicle and conversed with the informant about attempts to locate magazines for the stolen AK- 47 rifle, and Bell informed C/S-1 that he sold the weapon. Bell told C/S-1 that he had a photo of the AK-47 on his phone, which he sent to C/S-1 via picture message and the FBI agent later viewed. Bell was arrested on April 9, 2015, for possession of the stolen AK-47 and charged with being a felon in possession of a firearm, in violation of Title 18 United States Code, Section 922(g). Upon Bell’s arrest, a black mobile flip phone was located on his person. After Bell was arrested, he was transported to the Peoria Police Department and placed in an interview room. Shortly thereafter, Officer Sinks arrived at the police station (he was not the arresting officer). At the suppression hearing Sinks testified that before interviewing Bell with agent Nixon, he opened the door to the interview room, grabbed Bell’s cell phone from a bag or container outside the door, opened the phone (purportedly to turn it off) and showed the home screen depicting the rifle to Bell with an inquisitive look. Officer Sinks then held the power button on the phone to turn it off. Once SA Nixon arrived, Sinks told him what he saw on the phone. In the interview room, Officer Sinks and SA Nixon again opened the phone, which was now turned off, and then removed the battery and recorded the serial numbers on the device. 2 1:15-cr-10029-JES-JEH # 71 Page 2 of 16
  • 3. On April 17, 2015, the United States submitted an application for a search warrant based on the affidavit of Special Agent Jason Nixon, and Judge McDade granted the warrant the same day. A subsequent search warrant for electronically stored data relating to the date and time the picture was taken was granted on October 20, 2015. Legal Standard “Where a search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing . . . reasonableness generally requires the obtaining of a judicial warrant.” Veronia School Dist. 47J v. Acton, 515 U.S. 646, 653 (1995). Thus, “searches conducted outside the judicial process, without prior approval by a judge or magistrate, are per se unreasonable under the Fourth Amendment—subject only to a few specifically established and well-delineated exceptions.” Arizona v. Gant, 556 U.S. 332, 338 (2009) (quoting Katz v. United States, 389 U.S. 347, 357 (1967)). One exception to the warrant requirement is for a search incident to a lawful arrest. Chimel v. California, 395 U.S. 752 (1969). Although a search incident to lawful arrest remains an exception to the warrant requirement, the Supreme Court has declined to extend the categorical rule for searches incident to arrest to searches of data on cell phones. Riley v. California, 134 S.Ct. 2473, 2485 (2014) (holding that officers must generally secure a warrant before conducting a search of data on cell phones, even when a cell phone is seized incident to arrest). Part of the Supreme Court’s rationale for treating cell phones differently stemmed from the fact that “[c]ell phones differ in both a quantitative and qualitative sense from other objects that might be kept on an arrestee’s person.” Riley, 134 S.Ct. at 2489. In holding that the search incident to arrest exception to the warrant requirement does not extend to cell phones, the Supreme Court noted that “other case- 3 1:15-cr-10029-JES-JEH # 71 Page 3 of 16
  • 4. specific exceptions may still justify a warrantless search of a particular phone,” such as the exigent circumstances exception. Id. at 2494. The Riley decision also addressed the government’s concerns about officer safety and the potential loss or destruction of evidence in particular cases. Id. at 2485-89. As to the first concern, the Court made clear that law enforcement officers “remain free to examine the physical aspects of a phone to ensure that it will not be used as a weapon—say, to determine whether there is a razor blade hidden between the phone and its case.” Id. at 2485. As to the latter concern, preventing the destruction of evidence, the Court reasoned that “law enforcement is not without specific means to address the threat.” Id. at 2487. For instance, the Court stated that remote wiping could be prevented by disconnecting the phone from the network, either by turning the phone off, removing its battery, or placing it in a Faraday bag. Id. (also noting, in the event that officers seize a phone in an unlocked state, that they may be able to disable the phone’s locking mechanism as a preventative measure under McArthur, which approved of officers’ reasonable steps to secure a scene and preserve evidence while they awaited a warrant). Analysis Defendant Bell’s Motion argues that Officer Sinks conducted an unconstitutional search when he opened Bell’s phone. The government’s response contends that Officer Sinks’ conduct did not amount to a search because the photograph of the firearm was in plain view, and “Riley specifically approved of this procedure and authorize[d] the officer to do exactly what he did.” 1) Whether Opening Bell’s Phone Constituted a Search The government’s response to Bell’s Motion asserts that Officer Sinks’ opening of the flip phone did not constitute a search. While it is true that a “cursory inspection—one that involves merely looking at what is already exposed to view, without disturbing it—is not a ‘search’ for 4 1:15-cr-10029-JES-JEH # 71 Page 4 of 16
  • 5. Fourth Amendment purposes,” Officer Sinks’ opening of Bell’s cell phone exceeded a “cursory inspection” because he exposed to view concealed portions of the object—i.e., the screen. See Arizona v. Hicks, 480 U.S. 321, 328-29 (1987). The Supreme Court specifically addressed this issue in Hicks, noting that the “distinction between ‘looking’ at a suspicious object in plain view and ‘moving’ it even a few inches is much more than trivial for purposes of the Fourth Amendment.” Id. at 325. Officer Sinks’ opening of the flip phone, like the officer moving the stereo equipment in Hicks, “exposed to view concealed portions of the [object]” and thus “produced a new invasion of [defendant’s] privacy.” See Hicks, 480 U.S. at 324 (reasoning that “[a] search is a search, even if it happens to disclose nothing but the bottom of a turntable”). Likewise, because Officer Sinks had to manipulate the phone to view the picture on the screen, that picture was by definition not in “plain view.” See Hicks, 480 U.S. at 326; see also United States v. Venegas, 594 Fed. App’x. 822, 825 (5th Cir. 2014) (“Because Deputy Villegas had to manipulate the phone to view the photograph, however, we are hesitant to conclude that the photograph was within Deputy Villegas’s plain view.”). The government’s assertion that “the defendant’s cell phone was lawfully seized” also misses the point. Although the police officers were justified in searching his person and seizing his personal effects upon his arrest, Riley made clear that “while Robinson’s categorical rule [for searches incident to arrest] strikes the appropriate balance in the context of physical objects,” “a warrant is generally required before [a cell phone] search, even when a cell phone is seized incident to arrest.” Riley, 134 S.Ct. at 2484, 2493. Here, Officer Sinks’ search of Bell’s cell phone was limited to viewing the home screen. He did not rummage through videos, photos, contacts and call logs like the officers who searched Riley’s cell phone. Riley, 134 S.Ct. at 2480-81. The search of Bell’s cell phone was also less 5 1:15-cr-10029-JES-JEH # 71 Page 5 of 16
  • 6. intrusive than the search of Wurie’s flip phone. Id. at 2481 (in the companion case to Riley, the officers opened Wurie’s phone after it repeatedly rang, observed the home screen picture of a woman and a baby, opened the call log, and found the number associated with the incoming calls). It is also possible that Bell has a lesser privacy interest in the information contained on the home screen of his cell phone than he does on information stored elsewhere on the device. For example, in United States v. Concepcion, the Seventh Circuit held that although Concepcion had a privacy interest in the keyhole of an apartment door lock sufficient to make the inspection of the lock a “search,” “the privacy interest [was] so small that the officers [did] not need probable cause to inspect it.” 942 F.2d 1170, 1173 (7th Cir. 1991). Concepcion distinguished the lock from the turntable in Hicks, reasoning that “[w]hat the officers learned from inverting the turntable in Hicks they could not have come by in any other way; these agents thus invaded less of Concepcion’s interest in security of information when they used the key to verify his address.” Id. However, Concepcion is distinguishable from Riley because searches of information stored on cell phones implicate privacy interests that necessitate stronger protections against warrantless searches compared to the physical objects envisioned in Robinson. See Riley, 134 S.Ct. at 2478 (noting that searches of an arrestee’s pockets “works no substantial additional intrusion on privacy beyond the arrest itself,” for physical items, but “more substantial privacy interests are at stake when digital data is involved”). The lens through which all information on a cell phone is observed is the screen. On both flip phones and more modern, advanced devices, “notifications” are regularly displayed on the home screen or lock screen indicating text messages, missed calls, and other alerts. The position that the government advances here—that officers can always open a phone and look at the screen to turn the phone off without conducting 6 1:15-cr-10029-JES-JEH # 71 Page 6 of 16
  • 7. a “search” at all—is inconsistent with Riley’s requirement that “unlike the search incident to arrest exception, the exigent circumstances exception requires a court to examine whether an emergency justified a warrantless search in each particular case.” Id. at 2494. Just as Riley analyzed and rejected California’s attempt to create across the board exceptions, such as a rule allowing police to search call logs, without a warrant, the Court sees no reason to allow law enforcement to circumvent the warrant requirement in every case under the guise that they discovered evidence when they opened the phone or turned on the screen to turn the phone off. Furthermore, “[a] series of opinions allowing some cell phone searches but not others, based on the nature and reasonableness of the intrusion, would create exactly the ‘inherently subjective and highly fact specific’ set of rules that the Court has warned against and would be extremely difficult for officers in the field to apply.” United States v. Wurie, 728 F.3d 1, 12-13 (1st Cir. 2013) aff’d sub nom. Riley v. California, 134 S.Ct 2473 (2014). The prescient Wurie opinion warned of the justification offered by the government here, noting that “[a] rule based on particular instances in which the police do not take full advantage of the unlimited potential presented by cell phone data searches would prove impotent in those cases in which they choose to exploit that potential.” Having determined that a search occured, whether Officer Sinks’ warrantless search of Bell’s cell phone was permissible depends on whether an exception to the general rule justified the warrantless search. 2) Whether the Warrantless Search was Reasonable: Exigent Circumstances “In the absence of a warrant, a search is reasonable only if it falls within a specific exception to the warrant requirement.” Riley, 134 S.Ct. at 2482, quoting Kentucky v. King, 563 U.S. 452, 459 (2011). One such exception is for exigent circumstances, where “the exigencies of the situation make the needs of law enforcement so compelling that a warrantless search is 7 1:15-cr-10029-JES-JEH # 71 Page 7 of 16
  • 8. objectively reasonable under the Fourth Amendment.” King, 563 U.S. at 459. Here, two such exigencies are relevant: harm to officers and destruction of evidence. See Chimel v. California, 395 U.S. 752 (1969). a) Officer Safety Digital data stored on a cell phone cannot itself be used as a weapon to harm an arresting officer or to effectuate the arrestee's escape. Law enforcement officers remain free to examine the physical aspects of a phone to ensure that it will not be used as a weapon—say, to determine whether there is a razor blade hidden between the phone and its case. Once an officer has secured a phone and eliminated any potential physical threats, however, data on the phone can endanger no one. Riley v. California, 134 S. Ct. 2473, 2485 (2014). The Court in Riley acknowledged the possibility that a cell phone could conceal weapons such as a razor blade, but reasoned that such possibility does not “justify dispensing with the warrant requirement across the board.” Id. at 2486. Rather, “[t]o the extent dangers to arresting officers may be implicated in a particular way in a particular case, they are better addressed through consideration of case-specific exceptions to the warrant requirement, such as the one for exigent circumstances.” Id. The government’s response to Defendant’s Motion largely parrots the exigent circumstances hypotheticals offered by the Court in Riley. See E.C.F. Doc 60, at 8 (“Phones may also have been physically altered in a way that poses a risk to officer safety . . . [a]lthough the Court in Riley did not consider these risks to be sufficient to justify routine warrantless searches of a phone’s contents, it approved of law enforcement taking reasonable steps to protect themselves and preserve data while a warrant is sought.”). The problem with the government’s argument is that it does not claim that the officer searched the phone because he was actually concerned for his safety. And because the search of Bell’s phone occurred while Bell was in custody at the police station, such a concern would either be remote or entirely 8 1:15-cr-10029-JES-JEH # 71 Page 8 of 16
  • 9. absent. Since Riley recognized case-specific exceptions to the warrant requirement when “dangers to arresting officers may be implicated in a particular way in a particular case,” it follows that the concern for officer safety must actually be present in the particular case in order for the exception to apply. Riley, 134. S.Ct. at 2486. No such facts are present here; thus, officer safety does not justify the search. b) Preventing Destruction of Evidence Exigent circumstances may also justify law enforcement efforts to prevent the destruction of evidence when officers have specific concerns about the potential loss of evidence in a particular case. Id. at 2487; Chimel v. California, 395 U.S. 752, 764 (1969). As the Court in Riley acknowledged, information stored on cell phones may be vulnerable to remote wiping, where the cell phone’s owner or a third party can send a wireless signal that erases the data stored on the device. Riley, 134 S.Ct. at 2486-87 (the Court noted, however, that it has “little reason to believe” that remote wiping is prevalent). The Riley Opinion offered a number of solutions to address situations where law enforcement officers suspect that someone may attempt to erase the information stored on a seized device: In any event, as to remote wiping, law enforcement is not without specific means to address the threat. Remote wiping can be fully prevented by disconnecting a phone from the network. There are at least two simple ways to do this: First, law enforcement officers can turn the phone off or remove its battery. Second, if they are concerned about encryption or other potential problems, they can leave a phone powered on and place it in an enclosure that isolates the phone from radio waves. . . . To the extent that law enforcement still has specific concerns about the potential loss of evidence in a particular case, there remain more targeted ways to address those concerns. If “the police are truly confronted with a ‘now or never’ situation,”—for example, circumstances suggesting that a defendant's phone will be the target of an imminent remote-wipe attempt—they may be able to rely on exigent circumstances to search the phone immediately. Missouri v. McNeely,133 S.Ct. 1552, 1561–1562 (2013). Or, if officers happen to seize a phone in an unlocked state, they may be able to disable a phone's automatic-lock feature in 9 1:15-cr-10029-JES-JEH # 71 Page 9 of 16
  • 10. order to prevent the phone from locking and encrypting data. Such a preventive measure could be analyzed under the principles set forth in our decision in McArthur, 531 U.S. 326, which approved officers' reasonable steps to secure a scene to preserve evidence while they awaited a warrant. Riley v. California, 134 S. Ct. 2473, 2487-88 (2014) (some citations omitted). Again, the problem with the government’s argument is that it does not claim the arresting officer searched the phone because he was actually concerned that data on Bell’s cell phone risked destruction by remote wiping. Although Riley did not offer specific guidance as to how courts should scrutinize law enforcement’s claims alleging concern for officer safety or destruction of evidence, the Riley Opinion was clear that exigent circumstances must actually be present “in each particular case” in order for the exception to the warrant requirement to apply. Id. at 2494 (“The critical point is that, unlike the search incident to arrest exception, the exigent circumstances exception requires a court to examine whether an emergency justified a warrantless search in each particular case.”)(emphasis added). The government’s response appears to concede as much, stating that “the Court in Riley did not consider these risks to be sufficient to justify routine warrantless searches of a phone’s contents,” but goes on to state that the Court “approved of law enforcement officers taking reasonable steps to protect themselves and to preserve data while a warrant is sought.” Yet neither the government’s response, nor the warrant affidavit, asserted that the officer in this case opened Bell’s cell phone out of a concern for officer safety or preservation of evidence. And without that nexus, the officer’s search of Bell’s cell phone amounted to the very “routine warrantless search” that the government’s response acknowledges Riley proscribed. Lastly, the statement in the government’s response that Officer Sinks opened the phone “following his training and standard procedure” is inconsistent with testimony elicited from Sinks and other officers at the suppression hearing. See E.C.F. Doc. 60, at 5. At the hearing, 10 1:15-cr-10029-JES-JEH # 71 Page 10 of 16
  • 11. Sinks testified that department procedures instructed officers to remove the battery once a phone is seized, but stated that no one had briefed him on Bell’s status and he did not believe Bell’s phone had been “seized” at that point. Although the Court believes the facts indicate the phone was seized—Bell was arrested pursuant to an arrest warrant, he was in custody at the Peoria Police Department and his phone was taken from his person—Officer Sinks’ belief regarding when the phone was seized does not change the analysis. Officer Sinks also testified that he typically powers a phone off to avoid any distractions, and if Bell were to be released the phone would be returned to him. Agent Nixon testified that he wanted to seize the phone but had not yet informed Sinks of his intention to do so. Officer Feehan testified that the policy was put in place partly because snooping software could be used to listen in on conversations when the phone is turned off but still connected to the battery, and other methods could “compromise data” on the phone. While the procedure may be outdated as applied to modern cell phones that lack removable batteries, that problem was not present here, and the video later showed Officer Sinks removing the battery. Where officers have two equally effective options to turn off a phone, they should choose the less intrusive option. That was not done in this case, and as a result, incriminating evidence was found. In sum, the testimony surrounding the department policies and procedures for handling Bell’s cell phone further supports the Court’s conclusion that the search was unlawful. The government has not demonstrated the presence of exigent circumstances in this particular case; thus, Riley’s general rule prohibiting warrantless searches of cell phones applies. The search of Bell’s cell phone violated the Fourth Amendment prohibition against unreasonable searches and seizures. 11 1:15-cr-10029-JES-JEH # 71 Page 11 of 16
  • 12. 3) The April and October 2015 Search Warrants The Defendant also moves to suppress any evidence obtained from the April and October search warrants on the grounds that the warrants were not supported by probable cause. Specifically, Defendant argues that: (1) the affidavit submitted in support of the warrant application relied on a confidential source who did not testify before the issuing judge and whose reliability was not established; (2) the recording and transcripts were not provided to the issuing judge; (3) the affidavit does not state whether the confidential source or the theft victim confirmed that the firearm depicted in the photograph was the same firearm that was stolen and later sold to the Defendant; and (4) the affidavit does not state the telephone number associated with the February 25, 2015 picture message was the same number as the one assigned to the cell phone seized from Defendant. The application for warrant contains a paragraph reciting Officer Sinks’ observation of the picture on the home screen of Bell’s cell phone. See E.C.F. Doc 53, Ex. 3, at 3. The government’s response argues that: (1) the officer did not run afoul of the Fourth Amendment when he opened Bell’s cell phone before obtaining a warrant; thus, the paragraph in the warrant application should not be stricken; and (2) even if the paragraph was stricken, the affidavit sufficed to establish probable cause to grant the warrant. As discussed above, the officer’s opening of Bell’s cell phone constituted a search in violation of the Fourth Amendment. Thus, the Court cabins its analysis to the government’s alternative argument—whether the warrants were supported by probable cause absent the offending paragraph. The following statements are taken from the April, 2015 affidavit in support of warrant. An AK-47 style rifle was stolen from a Pekin resident’s home, and that the resident suspected C/S-1 was responsible for the burglary. C/S-1 confessed to the burglary as part of a proffer 12 1:15-cr-10029-JES-JEH # 71 Page 12 of 16
  • 13. agreement after C/S-1 had been arrested on charges related to the manufacture of methamphetamine. The confidential source advised law enforcement that he sold the firearms to a drug dealer by the street name “Jay” for cocaine and money. C/S-1 provided assistance to the FBI and Illinois State Police, including participating in a controlled buy of small amounts of cocaine from “Jay” where both video and photographs were taken. On February 17, 2015, SA Nixon interviewed an inmate at the Peoria County Jail. The inmate was shown portions of the video and a photograph from the controlled buy and immediately recognized the individual as Demontae Bell, stating his confidence was a “ten” on a one-to-ten scale. After the interview, SA Nixon showed an unmarked booking picture of Demontae Bell to C/S-1, who positively identified the individual as “Jay.” SA Nixon ran a query of Bell’s criminal history and observed that bell was arrested in 2002 for charges relating to delivery of a controlled substance and the felony sentence disposition stated “3 years.” On February 25, 2015, a second controlled buy with C/S-1 and Bell was conducted using a concealed audio/video recording device. During the purchase, Bell entered C/S-1’s vehicle and discussed C/S-1’s attempts to locate magazines for the stolen AK-47. The recording confirmed that Bell told C/S-1 that he had sold the AK-47. The video recording also depicted Bell informing C/S-1 that he had a picture of the AK-47 on his phone and sending that picture to C/S-1 from his cell phone, which SA Nixon later viewed.1 An affidavit must provide the magistrate with a substantial basis for determining the existence of probable cause. Illinois v. Gates, 462 U.S. 213, 239 (1983). When an affidavit is the only evidence presented to a judge in support of a search warrant, the warrant’s validity rests solely on the strength of the affidavit. United States v. Peck, 317 F.3d 754, 756 (2003). When analyzing the 1 At the hearing, Bell’s attorney stated that additional information was omitted from the affidavit that would have negated the existence of probable cause necessary to secure a warrant. That evidence is not before the Court at this time and was not considered. 13 1:15-cr-10029-JES-JEH # 71 Page 13 of 16
  • 14. credibility of an informant, a court considers: (1) the personal observations of the informant, (2) the degree of detail given in the affidavit, (3) independent police corroboration of the information, (4) the interval of time between the events and the application for a warrant, and (5) whether the informant testified at the probable cause hearing. Id. A deficiency in one factor may be compensated by strength in another or some other indication of reliability. Id. A facially valid warrant issued by a neutral, detached magistrate will be upheld if the police relied on the warrant in good faith. See United States v. Leon, 468 U.S. 897, 915 (1984). Here, the issuing judge had a substantial basis for determining the existence of probable cause, and omitting the offending paragraph about the officer opening the phone does not alter that conclusion. Defendant argues that the affidavit in support of the warrant relied on a confidential source who did not testify in front of the issuing judge, and who cooperated with law enforcement as part of a proffer agreement for drug charges. True, but the veracity of an informant is only one factor among many that Courts consider when making a probable cause determination. See Gates, 462 U.S. at 238. And while veracity, reliability, and basis of knowledge are highly relevant, those considerations should not “be understood as entirely separate and independent requirements to be rigidly drawn in every case.” Id. at 230. Moreover, “[t]he reliability or veracity of an informant in a particular case can also be shown by corroboration of the information he provides through independent police investigation.” United States v. Mitten, 592 F.3d 767, 774 (7th Cir. 2010). The fact that the confidential source was “motivated by a desire to lessen the consequences [he] would likely suffer for [his] own crimes . . . does not make the information [he] provide[d] inherently unreliable.” Id. (quoting United States v. Olson, 408 F.3d 366, 371 (7th Cir. 2005)). Here, the confidential source was implicated by the victim of the firearm burglary, who the victim believed had knowledge of his gun collection and sold guns. When law enforcement 14 1:15-cr-10029-JES-JEH # 71 Page 14 of 16
  • 15. interviewed C/S-1, he admitted he sold the guns to a Peoria drug dealer with the alias “Jay.” A separate informant confirmed that “Jay” was Demontae Bell. A search of Bell’s criminal history revealed that he had a prior felony conviction for delivery of a controlled substance. The two controlled purchases between Bell and C/S-1 were recorded. The affidavit summarizes (accurately) the conversations between Bell and C/S-1, including admissions by Bell that he sold the AK-47. Significantly, the affidavit states, and the transcript supports, the fact that Bell used his cell phone to send C/S-1 a picture of the firearm, and that SA Nixon viewed the picture on C/S-1’s phone shortly after it was sent. From these facts, the affidavit submitted in support of the warrant application provided detailed, collaborated information from which the issuing judge reasonably concluded there was a fair probability that contraband or evidence of a crime would be found on Defendant’s cell phone. Gates, 462 U.S. at 238. Omitting the reference to the officer opening the phone does not alter the probable cause determination. Moreover, the picture of the AK-47 on Bell’s cell phone was not discovered inadvertently through the warrantless search. Rather, it was the same picture Bell sent to C/S-1 and SA Nixon viewed. Because the officers knew that Bell had a picture of the gun on his phone before the search ever took place, the independent source doctrine applies. See Nix v. Williams, 467 U.S. 431, 443 (1984). Under the independent source doctrine, the police are put “in the same, not a worse, position than they would have been if no police error or misconduct had occurred.” Id. Here, if Officer Sinks had not opened Bell’s phone, the photo would have ultimately been discovered because the officers knew that Bell had the photo on his phone. Lastly, the second search warrant was almost identical to the first, except that it replaced the offending paragraph about Officer Sinks opening the phone with a statement that the picture 15 1:15-cr-10029-JES-JEH # 71 Page 15 of 16
  • 16. was found when the first warrant was executed. Therefore, the search warrants were adequately supported by probable cause and the photo and associated data will not be suppressed. CONCLUSION For the reasons stated above, Defendant’s Motion to Suppress is DENIED. This matter remains set for pretrial conference on May 5, 2016. Signed on this 20th day of April, 2016. s/ James E. Shadid James E. Shadid United States District Judge 16 1:15-cr-10029-JES-JEH # 71 Page 16 of 16