Notice: This opinion is subject to formal revision before publication in the
Atlantic and Maryland Reporters. Users are requested to notify the Clerk of the
Court of any formal errors so that corrections may be made before the bound
volumes go to press.

               DISTRICT OF COLUMBIA COURT OF APPEALS

                                  No. 15-CF-322
                                                                         09/21/2017
                            PRINCE JONES, APPELLANT,

                                        V.


                            UNITED STATES, APPELLEE.

                         Appeal from the Superior Court
                          of the District of Columbia
                                (CF1-18140-13)

                     (Hon. Jennifer M. Anderson, Trial Judge)

(Argued April 18, 2017                               Decided September 21, 2017)

      Stefanie Schneider, Public Defender Service, with whom Samia Fam and
Jaclyn Frankfurt, Public Defender Service, were on the brief, for appellant.

       Lauren R. Bates, Assistant United States Attorney, with whom Channing D.
Phillips, United States Attorney, and Elizabeth Trosman, John P. Mannarino, and
Jodi S. Lazarus, Assistant United States Attorneys, were on the brief, for appellee.

      Nathan Freed Wessler, American Civil Liberties Union, with whom Arthur
B. Spitzer and Scott Michelman, American Civil Liberties Union, and Jennifer
Lynch, Electronic Frontier Foundation, were on the brief, for American Civil
Liberties Union of the Nation‘s Capital and Electronic Frontier Foundation, amicus
curiae, in support of appellant.

      Before THOMPSON and BECKWITH, Associate Judges, and FARRELL, Senior
Judge.
                                         2


      Opinion by Associate Judge BECKWITH for the court, except as to Part II.E.3.

     Opinion by Senior Judge FARRELL, concurring in part and concurring in the
judgment, at page 47.

      Dissenting opinion by Associate Judge THOMPSON, at page 54.

      BECKWITH, Associate Judge: A jury found appellant Prince Jones guilty of

various offenses arising out of two alleged incidents of sexual assault and robbery

at knifepoint.1 Mr. Jones appeals his convictions on the ground that much of the

evidence offered against him at trial was the direct or indirect product of a

warrantless—and thus, Mr. Jones argues, unlawful—search involving a cell-site

simulator or ―stingray.‖2 Mr. Jones presented this Fourth Amendment claim to the

trial court in a pretrial motion to suppress, but the trial court denied it under the

      1
         Mr. Jones was convicted of two counts of first-degree sexual abuse while
armed, D.C. Code §§ 22-3002 (a)(1)–(2), -3020 (a)(5), -3020 (a)(6), -4502 (2012
Repl.); two counts of kidnapping while armed, id. §§ 22-2001, -4502; four counts
of robbery while armed, id. §§ 22-2801, -4502; and one count of threats, id. § 22-
1810.
      2
          The ―StingRay‖ is a popular cell-site simulator produced by the Harris
Corporation. See Stephanie K. Pell & Christopher Soghoian, Your Secret
Stingray’s No Secret Anymore: The Vanishing Government Monopoly over Cell
Phone Surveillance and Its Impact on National Security and Consumer Privacy, 28
Harv. J.L. & Tech. 1, 14 (2014). The name has become a generic term for a cell-
site simulator. Kim Zetter, Hacker Lexicon: Stingrays, the Spy Tool the
Government Tried, and Failed, to Hide, Wired (May 6, 2016),
https://www.wired.com/2016/05/hacker-lexicon-stingrays-spy-tool-government-
tried-failed-hide/. The record in this case does not reveal the name of the device
used against Mr. Jones; in the suppression hearing, the trial court sustained the
government‘s objection to a question about the name of the device.
                                          3


inevitable-discovery doctrine3 and did not reach the question whether the

government violated Mr. Jones‘s rights.       We agree with Mr. Jones that the

government violated the Fourth Amendment when it deployed the cell-site

simulator against him without first obtaining a warrant based on probable cause.

Further, we reverse the trial court‘s inevitable-discovery ruling and reject the

government‘s argument (not resolved by the trial court) that the good-faith

doctrine4 precludes applying the exclusionary rule in this case.       Because the

admission at trial of the evidence obtained as a result of the unlawful search was

not harmless beyond a reasonable doubt, we reverse Mr. Jones‘s convictions.



                                  I. Background



                     A. Investigation and Arrest of Mr. Jones


      At the suppression hearing in this case, Detective Rachel Pulliam, a member

of the Sexual Assault Unit of the Metropolitan Police Department (MPD), testified

that she investigated a sexual assault that occurred around 12:30 a.m. on October 9,

2013, and another that occurred around 1:30 a.m. on October 11. The two sexual-


      3
          See Nix v. Williams, 467 U.S. 431 (1984).
      4
          See United States v. Leon, 468 U.S. 897 (1984).
                                         4


assault complainants were women who had advertised escort services on the

classified-advertising website Backpage. Detective Pulliam testified that on each

occasion, the perpetrator5 contacted the complainant by telephone in response to an

advertisement and arranged to pay the complainant for sexual services. According

to Detective Pulliam, when each complainant arrived at the arranged meeting

place, the perpetrator ―forced [her] to perform oral sex on [him] at knifepoint‖ and

robbed her of her cellphone and other property. Detective Pulliam testified that on

one of the two occasions, the perpetrator also robbed the complainant‘s cousin,

who had been waiting in a car outside the meeting location.



      Detective Pulliam testified that in the morning following the second

incident, she and her colleagues obtained telephone records for the sexual-assault

complainants.    The telephone records revealed a possible suspect:            Both

complainants had received calls from the same number during the relevant time

periods. Detective Pulliam sought the assistance of the MPD‘s Technical Services

Unit (TSU) to track the suspect‘s and the complainants‘ phones.




      5
        Detective Pulliam referred to the perpetrator as ―the defendant,‖ but Mr.
Jones was not known to the police at the time the complainants reported the crimes
and only became known after the police tracked him down using the cell-site
simulator.
                                         5


      Sergeant Todd Perkins, a supervisor in the TSU, testified about his office‘s

efforts to track the phones that morning. He testified that he and his team sought

―subscriber information‖ for the suspect‘s number from the provider associated

with that number but were unsuccessful—the cellphone ―was just a generic

prepaid‖ with ―no subscriber information whatsoever.‖ The TSU also sought and

obtained information about the locations of the suspect‘s and complainants‘

cellphones from the relevant telecommunication providers.6 According to Sergeant

Perkins, the TSU received updated location information from the providers every

fifteen minutes. The information came in the form of geographic coordinates—

latitude and longitude—with a ―degree of uncertainty‖ specified in meters.



      Sergeant Perkins testified that the real-time location information they

received that morning had a high degree of uncertainty—―several hundred

meter[s]‖—indicating that the phones‘ GPS capabilities were inactive.            He

explained that ―if it [had been] true GPS,‖ his team would have been ―getting two

meter, three meter, five meter hits.‖ Despite the lack of precision in the location

information, Sergeant Perkins and his team were able to ―tell that . . . one of the
      6
         Officer Perkins testified that the TSU ―declared an exigent situation‖ and
was therefore ―able to obtain the [real-time location] information without getting a
warrant.‖ Officer Perkins admitted at the suppression hearing that his team had
been operating under an erroneous belief that there had been a string of three
sexual assaults by the same perpetrator within the preceding twenty-four hours.
                                         6


[complainants‘] phones and the [suspect‘s] phone were traveling in the same

general direction . . . as if they were together.‖ The location information suggested

that the two phones stopped in the general vicinity of the Minnesota Avenue Metro

Station.


      Based on this information, Sergeant Perkins and other TSU officers took a

truck equipped with a cell-site simulator to the area of the Minnesota Avenue

Metro station and used the device to track the suspect. Sergeant Perkins could not

remember whether he and his team used the cell-site simulator to track the

suspect‘s phone or the complainant‘s phone that they believed was traveling with

it,7 but whichever signal they were tracking led them, at around 11:30 a.m., to a

parked Saturn. Inside the Saturn were Mr. Jones and Mr. Jones‘s girlfriend, Nora

Williams. The police arrested Mr. Jones and recovered evidence from Mr. Jones‘s

person and his car and from Ms. Williams, including a folding knife and the
      7
          As explained in the testimony summarized below, a cell-site simulator
interferes with the target phone‘s ability to communicate with the cellular network.
Records for the complainant‘s phone show that there was a single communication
error around the time the TSU officers were operating the cell-site simulator, and
Sergeant Perkins inferred from this—and from other circumstantial information—
that his team had probably been tracking the complainant‘s phone. Other
evidence, however, suggested that the TSU may have been tracking the suspect‘s
phone. In particular, records for the suspect‘s phone—which turned out to be Mr.
Jones‘s phone—show seven failed calls during the relevant time period, and a data
dump of the phone revealed that during that time period Mr. Jones sent a text
message which said, ―Our call dropped.‖
                                          7


complainants‘ and the suspect‘s cellphones. Mr. Jones also made an incriminating

statement to the police. Ms. Williams later testified against Mr. Jones at trial.



                               B. Cell-Site Simulator


      Sergeant Perkins testified at the suppression hearing about ―how [the cell-

site simulator they used] works,‖ ―based on the information that‘s publicly

available.‖   He explained that his team engages the cell-site simulator by

programming into it a unique identifier—an MIN or IMSI number8—associated

with the target phone.9     The simulator then begins ―listening for [the target]

phone,‖ which, as part of its normal operation, is ―constantly transmitting to and

receiving from a tower.‖      The officers operating the cell-site simulator drive

around and ―as soon as [the simulator] comes across [the target phone‘s signal], it


      8
         These identifying numbers are distinct from the seven- or ten-digit number
that a person dials when he or she places a call. Sergeant Perkins testified that the
TSU receives these numbers by requesting ―subscriber information‖ for a phone
number. He explained that ―MIN‖ stands for ―mobile identification number‖ and
is the identifying number used by ―Verizon, Cricket and Sprint‖ and that ―IMSI‖
stands for ―international mobile subscriber identification‖ and is used by ―T-
Mobile and AT&T.‖
      9
          Sergeant Perkins testified that it is also possible to enter multiple
identifying numbers into the cell-site simulator. In this operating mode, he
explained, ―the equipment will just let us know one of those phones is present in
the area‖ but will not provide location information.
                                           8


grabs it and it holds on to it.‖ Once the cell-site simulator ―grabs‖ the target

phone, the simulator begins reporting ―general location information and signal

strength‖ that can be used to locate the target phone‘s exact location.10 Sergeant

Perkins testified that once the cell-site simulator ―grabs‖ the target phone, the

target phone is prevented from communicating ―with an actual . . . tower.‖



      Further information about the cell-site simulator was provided by Ben

Levitan, an expert on ―cellular telephone networks and systems‖ called by the

defense.11    According to Mr. Levitan, cell phones are ―dumb devices‖ that

―generally connect themselves to the strongest cell tower signal that they detect.‖

Mr. Levitan explained that a cell-site simulator ―act[s] as a portable cell tower,‖

which, ―when turned on or brought into an area, may appear to be a stronger signal

and cause [a] phone[] to break its connection with the cell phone network and

      10
           Sergeant Perkins explained the search process thus:
              [T]here is a directional antenna, . . . so we‘re driving this
              way, the directional antenna knows the signal is coming
              from over here, so we know the phone‘s coming over
              there. And then it also measures the signal strength from
              the phone, so if the signal strength is real, real low, it‘s
              probably somewhere behind you.

      11
          The defense also submitted an affidavit by Mr. Levitan, which Mr.
Levitan ―adopt[ed] . . . as part of [his] testimony,‖ without objection by the
government.
                                          9


reattach itself to the newly found . . . simulator.‖12 Mr. Levitan testified that when

the cellphone ―attach[es]‖ itself to the cell-site simulator, it ―identifies itself by

phone number and various codes,‖ including its IMSI number.13 Although Mr.

Levitan had never used the type of cell-site simulator utilized by law enforcement,

he   testified   that   he   had   used   similar   devices   working     within   the

telecommunications industry and that the devices allow the user to determine the

target phone‘s direction and distance relative to the simulator device.14 Moreover,

because the cell-site simulator is not a true cell tower connected with the cellular

network, any cellphone connected to the cell-site simulator will not be able to

communicate with the network:         ―[Y]our call doesn‘t go through[,] period.



      12
           Mr. Levitan testified that a cell-site simulator causes not only the target
phone, but ―[a]ll cell phones that are in the vicinity,‖ to ―attach . . . to the newly
found . . . simulator.‖
      13
        Cell-site simulators are sometimes referred to as ―IMSI catchers.‖ Pell &
Soghoian, supra note 2, at 11.
      14
           Mr. Levitan testified that when a cellphone is communicating with a
legitimate cellular tower, it communicates with a particular sector antenna of the
tower, and that the provider can thus determine ―what side of the cell tower‖ the
cellphone is on. Mr. Levitan indicated that cell-site simulators measure direction
through a similar method. But see supra note 10 (Sergeant Perkins describing a
somewhat different method of determining direction). And Mr. Levitan testified
that a cell-site simulator can determine distance through a ―trick‖ in which it
―send[s] . . . a signal [to the phone] and ask[s] it to send . . . the signal back.‖ By
―measur[ing] th[e] round trip time,‖ the distance between the cell-site simulator
and the phone can be determined.
                                          10


Nothing happens.‖15



              C. Trial Court’s Ruling on the Motion To Suppress


      In ruling on Mr. Jones‘s motion to suppress, the trial court did not decide

whether the use of a cell-site simulator was a search within the meaning of the

Fourth Amendment or whether the government was required to obtain a warrant to

use the cell-site simulator.    Instead, the trial court focused on the issues of

standing, exigent circumstances, and inevitable discovery.



      15
          We note that both witnesses‘ testimony about the cell-site simulator is
consistent with information in a Department of Justice memorandum on such
devices. See Dep‘t of Justice Policy Guidance: Use of Cell-Site Simulator
Technology (Sept. 3, 2015), https://www.justice.gov/opa/file/767321/download.
The memorandum explains:

             Cell-site simulators . . . function by transmitting as a cell
             tower. In response to the signals emitted by the
             simulator, cellular devices in the proximity of the device
             identify the simulator as the most attractive cell tower in
             the area and thus transmit signals to the simulator that
             identify the device in the same way that they would with
             a networked tower.

Id. at 2. Once the target cellphone is identified, the cell-site simulator ―provide[s]
. . . the relative signal strength and general direction‖ of the phone. Id. The
memorandum notes that the cell-site simulator can cause ―cellular devices in the
area [to] experience a temporary disruption of service from the service provider.‖
Id. at 5.
                                        11


      On the issue of standing, the trial court stated that the suppression-hearing

record did not reveal ―with any great degree of certainty‖ which phone—Mr.

Jones‘s or the complainant‘s—the police had tracked using the cell-site simulator.

The court believed that the burden was on the government to show that the police

did not track Mr. Jones‘s phone and found that the government had failed to meet

this burden. The government did not take issue with this allocation of the burden

of proof and agreed with the court‘s determination.16


      The trial court rejected the government‘s argument that there were exigent

circumstances justifying noncompliance with any otherwise applicable warrant

requirement—though, again, the trial court did not determine whether there was a

warrant requirement. The court noted that significant time (around ten hours) had

passed between the sexual assault and the arrest of Mr. Jones on October 11,

during which time ―the detectives could have been getting a warrant.‖



       The trial court agreed with the government‘s argument that regardless of

whether there had been a Fourth Amendment violation, the inevitable-discovery

      16
          The government has reversed course in this appeal and is now arguing
that Mr. Jones bore the burden of proving that the government searched his phone
and failed to meet this burden. But because the government affirmatively—and
repeatedly—conceded the standing issue in the trial court, the government has
waived this argument.
                                         12


doctrine rendered the exclusionary rule inapplicable. The court found that ―even if

[the police] were using [Mr. Jones‘s] phone on the cell site simulator, . . . had they

switched over . . . to use the [complainant‘s] number instead, . . . they would have

eventually gotten to the exact same place because the phones were together[ a]nd

it‘s the same technology.‖ The court thus agreed with the government‘s assertion

that ―there[ was] a separate lawful means‖ by which the government ―would have

gotten to the exact same place.‖



                                   II. Discussion


      Mr. Jones claims that the government‘s use of a cell-site simulator violated

his Fourth Amendment rights and that the trial court erred in failing to grant his

motion to suppress. In deciding this Fourth Amendment claim, we defer to the

trial court‘s factual findings and review them only for clear error, but we review

the trial court‘s legal conclusions de novo. (Albert) Jones v. United States, 154

A.3d 591, 594 (D.C. 2017). The Fourth Amendment protects the ―right of the

people to be secure in their persons, houses, papers, and effects, against

unreasonable searches and seizures,‖ and thus we turn first to the threshold

question whether the government‘s use of the cell-site simulator to locate Mr.
                                         13


Jones‘s cellphone17 constituted a search or seizure.



                         A. Fourth Amendment Search


      Government conduct is a ―search‖ within the meaning of the Fourth

Amendment if it invades ―an actual (subjective) expectation of privacy . . . that

society is prepared to recognize as reasonable.‖ Katz v. United States, 389 U.S.

347, 361 (1967) (Harlan, J., concurring) (internal quotation marks omitted); see

also Kyllo v. United States, 533 U.S. 27, 33 (2001); Napper v. United States, 22

A.3d 758, 767 (D.C. 2011).       In deciding whether a particular expectation of

privacy is ―reasonable,‖ this court aims to ―assure[] preservation of that degree of

privacy against government that existed when the Fourth Amendment was

adopted.‖ Kyllo, 533 U.S. at 34. ―To withdraw protection of this minimum

expectation would be to permit police technology to erode the privacy guaranteed

by the Fourth Amendment.‖ Id.


      Our analysis begins with the obvious fact that most people have a cellphone




      17
          We consider it conceded that the government deployed the cell-site
simulator on Mr. Jones‘s phone rather than on one of the complainants‘ phones.
See supra notes 7 & 16, as well as the accompanying text.
                                        14


and carry it with them practically everywhere they go.18 One consequence of this

is that locating and tracking a cellphone using a cell-site simulator has the

substantial potential to expose the owner‘s intimate personal information. First,

―cell phone tracking can easily invade the right to privacy in one‘s home or other

private areas.‖ Tracey v. State, 152 So. 3d 504, 524 (Fla. 2014); see also State v.

Earls, 70 A.3d 630, 642 (N.J. 2013) (―[C]ell phones . . . blur the historical

distinction between public and private areas because [they] emit signals from both

places.‖). When this occurs, there is a ―clear[] . . . Fourth Amendment violation.‖

Tracey, 152 So. 3d at 524; see also United States v. Karo, 468 U.S. 705, 714

(1984) (―[P]rivate residences are places in which the individual normally expects

privacy free of governmental intrusion not authorized by a warrant, and that

expectation is plainly one that society is prepared to recognize as justifiable.‖).

And second, even a person‘s public movements, as observed by a cell-site

simulator or other means of cellphone tracking, can reveal sensitive information

about the person‘s ―familial, political, professional, religious, and sexual

associations.‖   United States v. (Antoine) Jones, 565 U.S. 400, 415 (2012)

(Sotomayor, J., concurring).

      18
         See Riley v. California, 134 S. Ct. 2473, 2490 (2014) (―[I]t is the person
who is not carrying a cell phone . . . who is the exception. According to one poll,
nearly three-quarters of smart phone users report being within five feet of their
phones most of the time . . . .‖).
                                          15


      Another consequence of cellphones‘ ―pervasiveness‖19 is that a cell-site

simulator can be used by the government not merely to track a person but to locate

him or her. See State v. Andrews, 134 A.3d 324, 348 (Md. Ct. Spec. App. 2016).

Police have always had the capacity to visually track a suspect from some starting

location, and electronic tracking devices like those used in United States v. Knotts,

460 U.S. 276 (1983), and Karo, 468 U.S. 705, have augmented this preexisting

capacity. But although the kind of device used in Knotts and Karo is probably

more reliable than a human tracker—less prone to discovery than a human and

harder to elude—at their core these devices merely enable police officers to

accomplish the same task that they could have accomplished through ―[v]isual

surveillance from public places.‖ Knotts, 460 U.S. at 282; see also Karo, 468 U.S.

at 713. This is because the tracking device must be physically installed on some

object that the target will later acquire or use. See, e.g., (Antoine) Jones, 565 U.S.

at 402–03 (GPS tracker placed on the defendant‘s wife‘s car); Karo, 468 U.S. at

708 (tracker placed in container of chemicals the defendant had purchased);

Knotts, 460 U.S. at 276 (same). These devices do not enable police to locate a

person whose whereabouts were previously completely unknown.



      With a cell-site simulator, however, police no longer need to track a person
      19
           Riley, supra note 18, 134 S. Ct. at 2490.
                                        16


visually from some starting location or physically install a tracking device on an

object that is in, or will come into, his or her possession. Instead, they can

remotely activate the latent tracking function of a device that the person is almost

certainly carrying in his or her pocket or purse: a cellphone. As the present case

demonstrates, police officers first obtain subscriber information and real-time

location information from the target‘s telecommunications provider to narrow

down the search area.20 They then proceed to that area with a cell-site simulator,


      20
          Mr. Jones has not argued in this appeal that the government violated his
Fourth Amendment rights when it obtained real-time cell-site location information
(CSLI) for his phone from his telecommunications provider. Also not involved in
this case is historical CSLI—location information maintained by cellular
companies in the ordinary course of business. Some courts have held that the
Fourth Amendment protects real-time CSLI, e.g., Tracey, 152 So. 3d at 523, but
many have held that the Fourth Amendment does not protect historical CSLI, e.g.,
United States v. Graham, 824 F.3d 421, 427–28 (4th Cir. 2016) (en banc). See
generally Eric Lode, Annotation, Validity of Use of Cellular Telephone or Tower
to Track Prospective, Real Time, or Historical Position of Possessor of Phone
Under Fourth Amendment, 92 A.L.R. Fed. 2d 1 (2015). The Fourth Amendment
analysis for real-time and historical CSLI disclosed by a telecommunications
provider is complicated by uncertainty about the applicability and scope of the
third-party doctrine. Compare Graham, 824 F.3d at 427–28 (―Each time
Defendants made or received a call, or sent or received a text message—activities
well within the ‗ordinary course‘ of cell phone ownership—[their provider]
generated a record of the cell towers used . . . . Having ‗exposed‘ the CSLI to
[their provider], Defendants here, like the defendant in Smith, ‗assumed the risk‘
that the phone company would disclose their [historical CSLI] to the government.‖
(quoting Smith v. Maryland, 444 U.S. 735, 744 (1979))), with In re United States
for an Order Authorizing the Release of Historical Cell-Site Info., 809 F. Supp. 2d
113, 126 (E.D.N.Y. 2011) (―[T]he court concludes that established normative
privacy considerations support the conclusion that the reasonable expectation of
privacy is preserved here, despite the fact that cell-site-location records [are]
                                                                      (continued…)
                                         17


which they use to force the person‘s cellphone to identify itself and reveal its exact

location. It is in this sense that a cell-site simulator is a locating, not merely a

tracking, device:   A cell-site simulator allows police officers who possess a

person‘s telephone number to discover that person‘s precise location remotely and

at will.



       A final consideration is that when the police use a cell-site simulator to

locate a person‘s cellphone, the simulator does not merely passively listen for

transmissions sent by the phone in the ordinary course of the phone‘s operation.

Instead, the cell-site simulator exploits a security vulnerability in the phone—the

fact that cellphones are, in the words of the defense expert, ―dumb devices,‖ unable

to differentiate between a legitimate cellular tower and a cell-site simulator

masquerading as one21—and actively induces the phone to divulge its identifying

information. Once the phone is identified, it can be located. So far as the present

record reveals, the only countermeasure that a person can undertake is to turn off


(…continued)
disclosed to cell-phone service providers.‖). The third-party doctrine has no
application in the present case, however, because the police‘s use of a cell-site
simulator is ―direct government surveillance.‖ Graham, 824 F.3d at 426 & n.4.
       21
          See also Pell & Soghoian, supra note 2, at 12 (explaining that active
surveillance devices exploit the lack of an authentication mechanism in the 2G
phone protocol design).
                                           18


his or her cellphone or its radios (put it in ―airplane mode‖), thus forgoing its use

as a communication device.



      The preceding considerations lead us to conclude that the use of a cell-site

simulator to locate Mr. Jones‘s phone invaded a reasonable expectation of privacy

and was thus a search. First, given the potential for location information gathered

by a cell-site simulator or other device to reveal sensitive personal facts, people

justifiably seek to keep such information private. This is insufficient, in itself, to

support our conclusion that the government invaded a legitimate expectation of

privacy: Supreme Court precedent makes clear that certain forms of tracking do

not invade a reasonable expectation of privacy. See Knotts, 460 U.S. at 282

(holding that the use of an electronic device to track a suspect‘s movements in

public spaces did not invade a reasonable expectation of privacy); 22 see also Karo,

468 U.S. at 719 (holding that the unlawful use of a device to track movements

inside a residence did not necessarily taint the otherwise lawful use of the same

device to track the suspects in public).



      22
           But see (Antoine) Jones, 565 U.S. at 416 (Sotomayor, J., concurring) (―I
do not regard as dispositive the fact that the Government might obtain the fruits of
GPS monitoring through lawful conventional surveillance techniques.‖); id. at 430
(Alito, J., concurring in judgment) (―[T]he use of longer term GPS monitoring in
investigations of most offenses impinges on expectations of privacy.‖).
                                         19


      But in addition to the fact that people reasonably value and hope to protect

the privacy of their location information, what necessitates our conclusion is the

method by which the government obtained the location information in this case.

See Kyllo, 533 U.S. at 35 n.2 (―The fact that equivalent information could

sometimes be obtained by other means does not make lawful the use of means that

violate the Fourth Amendment.‖); United States v. Maynard, 615 F.3d 544, 566

(D.C. Cir. 2010) (―[W]hen it comes to the Fourth Amendment, means do matter.‖),

aff’d on other grounds by (Antoine) Jones, 565 U.S. 400. Unlike in a situation in

which the government determines a person‘s location through visual surveillance

or by employing the older generation of tracking devices, see Karo, 468 U.S. at

719; Knotts, 460 U.S. at 282, it cannot be argued that ―the information obtained by

[the government] in this case was . . . readily available and in the public view,‖

Andrews, 134 A.3d at 348. The cell-site simulator employed in this case gave the

government a powerful person-locating capability that private actors do not have

and that, as explained above, the government itself had previously lacked—a

capability only superficially analogous to the visual tracking of a suspect.23 And


      23
           We are accordingly unpersuaded by one court‘s suggestion that using
cellular technology to track a suspect is analogous to using ―dogs . . . to track a
fugitive . . . [by] his scent.‖ United States v. Skinner, 690 F.3d 772, 777 (6th Cir.
2012). And our dissenting colleague‘s suggestion that the search here was
permitted under the automobile exception to the Fourth Amendment, see post at
86–88, is similarly unconvincing. The dissent argues that under the automobile
                                                                       (continued…)
                                          20


the simulator‘s operation involved exploitation of a security flaw in a device that

most people now feel obligated to carry with them at all times. Allowing the

government to deploy such a powerful tool without judicial oversight would surely

―shrink the realm of guaranteed privacy‖ far below that which ―existed when the

Fourth Amendment was adopted.‖ Kyllo, 533 U.S. at 34. It would also place an

individual in the difficult position either of accepting the risk that at any moment

his or her cellphone could be converted into tracking device or of forgoing

―necessary use of‖ the cellphone. Tracey, 152 So. 3d at 523. We thus conclude

that under ordinary circumstances, the use of a cell-site simulator to locate a person

through his or her cellphone invades the person‘s actual,24 legitimate, and



(…continued)
exception, police officers could have searched Mr. Jones‘s car without a warrant
and seized ―any cell phones in it that might have been contraband or evidence of
the crime.‖ Post at 88. From this, the dissent claims, it follows that the police had
the right to use the cell-site simulator to search or seize Mr. Jones‘s phone. This
argument glosses over the fact that what the cell-site simulator obtained was Mr.
Jones‘s location information. When police search a car under the automobile
exception, by contrast, they do not obtain location information—they already know
the car‘s location if they are searching it. The dissent also glosses over the fact that
the police need probable cause to search a car under the automobile exception.
Tuckson v. United States, 77 A.3d 357, 366 (D.C. 2013). The police here did not
have probable cause to believe that there was evidence of a crime inside Mr.
Jones‘s car until they used the cell-site simulator to locate Mr. Jones‘s cellphone.
      24
          Ordinarily, a person need not do anything affirmative to exhibit an actual
subjective expectation that he or she will not be located and tracked by a cell-site
simulator. In Katz, the defendant was ―entitled to assume‖ that his phone
conversation was private based purely on the fact that he had ―occupie[d] [the
                                                                     (continued…)
                                         21


reasonable expectation of privacy in his or her location information and is a search.


      The government‘s argument to the contrary is unpersuasive.                 The

government contends that because a cellphone ―must continuously broadcast a

signal,‖ a person who carries or uses a cellphone is engaging in ―conduct [that] is

not calculated to keep [his] location private and . . . thus[] has no reasonable

expectation of privacy in his location.‖ The government cites for support United

States v. Wheeler, 169 F. Supp. 3d 896 (E.D. Wis. 2016), in which the court found

that ―today, when many Americans own some sort of cell phone and carry it

frequently, an individual‘s expectation that the government could not track his

whereabouts over time is [not] reasonable.‖ Id. at 908; see also id. (―The media is

rife with information—and sometimes warnings—about the fact that one‘s location

can be tracked from one‘s cell phone.‖).25 This line of reasoning rests on a


(…continued)
phone booth], shut[] the door behind him, and pa[id] the toll.‖ 389 U.S. at 352.
Likewise, in Kyllo, the Supreme Court found that the use of a thermal imager on
the defendant‘s home violated an expectation of privacy, without any discussion
about whether the defendant had taken measures to thwart the effectiveness of the
device. 533 U.S. at 40. But in fact in the present case, there was some evidence
that Mr. Jones affirmatively sought to keep his location information private: His
phone‘s GPS feature (to the extent it existed) had been disabled.
      25
          The government also cites United States v. Caraballo, 831 F.3d 95 (2d
Cir. 2016), cert. denied, 137 S. Ct. 654 (2017), a case in which the police obtained
real-time cell-site location information without a warrant. See supra note 20. The
court approved the officers‘ actions under the exigency exception. Caraballo, 831
                                                                      (continued…)
                                         22


misreading of the Katz expectation-of-privacy test that construes the test as

involving a probabilistic inquiry (an inquiry into whether it is likely—or the public

thinks it is likely—that the government can access the information in question)

rather than a normative one (an inquiry into whether it is consistent with the

nation‘s traditions and values that the government should have unfettered access to

the information).26 Contrary to the government‘s argument, Katz makes clear that



(…continued)
F.3d at 106. The court stated that ―any expectation of privacy that [the defendant]
had in his cell-phone location was dubious at best.‖ Id. at 105. But this remark
was part of a broader exigency analysis, and the court‘s primary justification for it
was the lack of decisive authority on the question. See id. at 106 (―[T]he fact that
the question of the degree of privacy that adheres to these sorts of information, to
date, divides those Circuit courts that have spoken to the issue reinforces the
conclusion that the intrusion here was not to an established, core privacy value.‖).
      26
            Moreover, the factual premise of the government‘s argument is
erroneous. The events at issue in this case occurred in 2013, and at that time cell-
site simulators were relatively unknown to the public. Law-enforcement agencies
around the country that acquired the device had been required (and, for all we
know, still continue to be required) to sign nondisclosure agreements with the
Federal Bureau of Investigation. See Matt Richtel, A Police Gadget Tracks
Phones? Shhh! It’s Secret, N.Y. Times, Mar. 15, 2015, https://www.nytimes.com/
2015/03/16/business/a-police-gadget-tracks-phones-shhh-its-secret.html; Pell &
Soghoian, supra note 2, at 38. Indeed, amici curiae have provided us with a
redacted copy of a nondisclosure agreement that the MPD signed. By signing this
agreement, the MPD agreed that, among other things, ―the equipment/technology
and any information related to its functions, operation, and use shall . . . [not be]
disclos[ed] . . . to the public in any manner including but not limited to: in press
releases, in court documents, during judicial hearings, or during other public
forums.‖ See also Andrews, 134 A.3d at 338 (detailing a similar agreement signed
by the Baltimore City Police Department). There is no evidence in the record that
Mr. Jones was aware of the government‘s secret use of the cell-site simulator and
                                                                      (continued…)
                                          23


a person does not lose a reasonable expectation of privacy merely because he or

she is made aware of the government‘s capacity to invade his or her privacy.

When Katz was issued, the public and the courts were well aware of the

government‘s capacity to wiretap and eavesdrop through technological means, yet

the Supreme Court did not find this fact determinative of the question whether

individuals possess a reasonable expectation of privacy in their conversations. See

Katz, 389 U.S. at 352 (citing Olmstead v. United States, 277 U.S. 438 (1928)

(wiretapping), and Goldman v. United States, 316 U.S. 129 (1942) (bugging)); see

also Susan Freiwald, First Principles of Communications Privacy, 2007 Stan.

Tech. L. Rev. 3, 28 (―In the several years preceding Katz, the public had learned of

rampant illegal wiretapping from numerous influential books, scholarly articles,

and newspaper accounts.‖). A person‘s awareness that the government can locate

and track him or her using his or her cellphone likewise should not be sufficient to

negate the person‘s otherwise legitimate expectation of privacy. See also Smith v.

Maryland, 442 U.S. 735, 741 n.5 (1979) (―[W]here an individual‘s subjective

expectations ha[ve] been ‗conditioned‘ by influences alien to well-recognized

Fourth Amendment freedoms, those subjective expectations obviously could play

no meaningful role in ascertaining what the scope of Fourth Amendment protection

(…continued)
little reason to believe that the public was widely aware of it.
                                         24


[is].‖); 1 Wayne R. LaFave, Search and Seizure:         A Treatise on the Fourth

Amendment § 2.1 (d) (5th ed. 2016) (―[W]hat is involved here is ‗our societal

understanding‘ regarding what deserves ‗protection from government invasion.‘‖

(quoting Oliver v. United States, 466 U.S. 170, 178 (1984))).


      The government‘s use of the cell-site simulator to locate Mr. Jones was

therefore a search.27 The government did not obtain a warrant and has not argued

      27
            We need not rule on Mr. Jones‘s alternative argument that the
government‘s conduct here constituted a search under (Antoine) Jones, 565 U.S.
400, where the court held that a trespass used to obtain information constitutes a
Fourth Amendment search. Mr. Jones makes a plausible argument that the
government‘s conduct constituted a trespass to his chattel—that is, that the
government ―intentionally . . . us[ed] or intermeddl[ed]‖ with his chattel, his
cellphone. Restatement (Second) of Torts § 217 (Am. Law Inst. 1965). The
government, through the cell-site simulator, coopted Mr. Jones‘s phone, forcing it
to do something Mr. Jones surely never intended it to do: reveal its identifying and
location information to an entity other than a telecommunications provider.
Moreover, it is a natural consequence of a cell-site simulator‘s use that it will
disrupt the operation of the target phone, and there is reason to believe that this
happened here, given the records showing Mr. Jones‘s seven failed calls. See
supra note 7. And numerous courts have held that computer hacking and
interference with electronic resources can satisfy the elements of common-law
trespass to chattels. See generally Marjorie A. Shields, Annotation, Applicability
of Common-Law Trespass Actions to Electronic Communications, 107 A.L.R.5th
549 (2003).

      But the question whether the holding of (Antoine) Jones extends beyond
physical trespasses is still an open one. It is unclear, first of all, whether the
holding of (Antoine) Jones depends on ―the law of trespass as it existed at the time
of the adoption of the Fourth Amendment‖ or whether new forms of the tort are
relevant. 565 U.S. at 426 (Alito, J., concurring in judgment). Assuming that the
former is the case, it is also not clear whether ―the[] recent decisions [recognizing
                                                                       (continued…)
                                          25


that the search ―f[ell] within a specific exception to the warrant requirement,‖ and

therefore the search was unlawful under the Fourth Amendment. United States v.

Riley, 134 S. Ct. 2473, 2482 (2014); see also United States v. Lewis, 147 A.3d 236,

239 (D.C. 2016) (en banc) (―A search conducted without a warrant is per se

unreasonable under the Fourth Amendment unless it falls within a few specific and

well-established exceptions.‖ (quoting United States v. Taylor, 49 A.3d 818, 821

(D.C. 2012))).28




(…continued)
electronic trespass to chattels] represent a change in the law or simply the
application of the old tort to new situations.‖ Id. at 426–27 (Alito, J., concurring in
judgment). Mr. Jones‘s counsel pointed out during oral argument that courts
recognized forms of nonphysical trespass on chattels long before the electronic
age, suggesting a possible answer to the second of these questions. See, e.g., Cole
v. Fisher, 11 Mass. 137 (1814) (holding that the plaintiff could sue for trespass to
chattels where the sound of the defendant‘s gunshot frightened the plaintiff‘s
horse, resulting in damage to the plaintiff‘s carriage); see also W. Page Keeton et
al., Prosser and Keeton on Torts § 14 n.8 (5th ed. 1984) (citing other cases). Yet
we do not have to answer these ―vexing‖ questions today. (Antoine) Jones, 565
U.S. at 426 (Alito, J., concurring in judgment).
      28
          Arguing that ―bystanders[‘] . . . phones [can be] ensnared by the cell site
simulator,‖ see supra notes 12 and 15, amici curiae ask us to adopt a requirement
that ―any cell site simulator warrant must include provisions to minimize
collection, retention, and use of bystanders‘ data.‖ See In re Application of the
United States for an Order Relating to Telephones Used by Suppressed, No. 15 M
0021, 2015 WL 6871289, at *3–4 (N.D. Ill. Nov. 9, 2015); In re Search Warrant,
71 A.3d 1158, 1170 (Vt. 2012) (―Warrants for electronic surveillance routinely set
out ‗minimization‘ requirements—procedures for how and under what conditions
the electronic surveillance may be conducted—in order to ‗afford similar
protections to those that are present in the use of conventional warrants authorizing
                                                                       (continued…)
                                        26


      Our conclusion that the government violated Mr. Jones‘s Fourth

Amendment rights is not the end of our inquiry. We must decide whether Mr.

Jones is entitled to a remedy, and if so what the scope of that remedy should be.

As a general matter, the ―[e]xclusionary rule . . . forbids the use of improperly

obtained evidence at trial.‖ Herring v. United States, 555 U.S. 135, 139 (2009).

―[T]his judicially created rule is ‗designed to safeguard Fourth Amendment rights

generally through its deterrent effect.‘‖ Id. at 139–40 (quoting United States v.

Calandra, 414 U.S. 338, 348 (1974)).           The government argues that the

exclusionary rule does not apply in this case, invoking the inevitable-discovery

doctrine, good-faith exception, and a change in its policies concerning the use of

cell-site simulators. The government also argues that much of the evidence that

Mr. Jones wants excluded does not fall within the scope of the exclusionary rule—

that it is not ―fruit of the poisonous tree.‖ Wong Sun v. United States, 371 U.S.

471, 488 (1963). We first address the inevitable-discovery doctrine.



                        B. Inevitable-Discovery Doctrine




(…continued)
the seizure of tangible evidence.‘‖ (quoting Berger v. New York, 388 U.S. 41, 57
(1967)) (brackets removed)). The issue of interference with third parties‘ phones is
not before us in this appeal, however.
                                         27


      The inevitable-discovery doctrine ―shields illegally obtained evidence from

the exclusionary rule if the government can show, by a preponderance of the

evidence, that the evidence ‗ultimately or inevitably would have been discovered

by lawful means.‘‖ Gore v. United States, 145 A.3d 540, 548 (D.C. 2016) (quoting

Hicks v. United States, 730 A.2d 657, 659 (D.C. 1999)); see also Nix v. Williams,

467 U.S. 431 (1984). To avail itself of the inevitable-discovery doctrine, the

government must prove two distinct elements: (1) that ―the lawful process which

would have ended in the inevitable discovery . . . ha[d] commenced before the

constitutionally invalid seizure,‖ and (2) that there is a ―‗requisite actuality‘ that

the discovery would have ultimately been made by lawful means.‖ Hicks, 730

A.2d at 659 (quoting Douglas-Bey v. United States, 490 A.2d 1137, 1139 n.6 (D.C.

1985), and Hilliard v. United States, 638 A.2d 698, 707 (D.C. 1994)) (brackets and

ellipsis removed).


      The trial court found that ―had [the police] switched [the cell-site simulator]

over to use the [complainant‘s phone] . . . they would have eventually gotten to the

exact same place because the phones were together.‖ Assuming for the sake of

argument that the hearing evidence supports this finding,29 we agree with the trial


      29
        Mr. Jones argues that this finding was clearly erroneous because ―[t]he
government presented no expert testimony about the functioning of the cell site
                                                                  (continued…)
                                          28


court that this finding justifies a conclusion that there was a separate lawful means

by which the police could have captured Mr. Jones and recovered the evidence

used against him at trial.30 The finding is insufficient, however, to support a

conclusion that the police would have captured Mr. Jones—which is what the

inevitable-discovery doctrine requires.



       The undisputed evidence in the record shows that the MPD possessed only

a single operating cell-site simulator,31 and that it could only be used to locate a

single phone at a time. The police used it to search for Mr. Jones‘s cellphone.

Thus, the police‘s search for the complainant‘s cellphone—the lawful process—

never occurred. If the lawful search never occurred, it did not ―commence[] before

(…continued)
simulator, choosing instead to present only lay testimony [by Sergeant Perkins]
about how the field operators use the device.‖ In Mr. Jones‘s view, ―there is no
evidence in the record about the failure rate of the cell site simulator or whether it
statistically works better with certain models of phones or on certain networks.‖
      30
          In this regard, we note that not only did Mr. Jones concede that he lacked
standing to contest a search involving the complainant‘s phone, but also the record
suggests that the complainant consented to the police‘s tracking of her phone. See
United States v. Johnson, 380 F.3d 1013, 1017 (7th Cir. 2004) (holding that to rely
on the inevitable-discovery doctrine the government must prove a lawful means by
which it would have obtained the evidence, and that it is insufficient to prove
merely that ―the evidence would have been discovered as a consequence of [an]
illegal search of [a third party], to which [the defendant] could not object‖).
      31
         The MPD owned another unit, but it was not working properly the day of
the search.
                                        29


the constitutionally invalid seizure‖ of Mr. Jones. Hicks, 730 A.2d at 659 (quoting

Douglas-Bey, 490 A.2d at 1139 n.6).



      The government disagrees with this conclusion and argues that because the

police had tracked the complainant‘s phone using real-time location information

from the provider and had obtained her phone‘s identifying information, they ―had

begun the process necessary to locate her phone with the cell-[s]ite simulator.‖

Even if we agreed that these steps constituted the commencement of a lawful

process, we would nonetheless find the second element of the inevitable-discovery

test—the ―requisite actuality‖ that the process would have led to the discovery of

Mr. Jones—lacking. This is because the police either suspended or abandoned the

purported lawful process when they chose to deploy the only operational cell-site

simulator in their possession on Mr. Jones‘s phone.



      This court has found the inevitable-discovery doctrine applicable in cases in

which the police engaged in lawful and unlawful processes in parallel.          See

Pinkney v. United States, 851 A.2d 479, 495 (D.C. 2004); McFerguson v. United

States, 770 A.2d 66, 74–75 (D.C. 2001); Hicks, 730 A.2d at 662. Had the unlawful

process not occurred in these cases, the lawful one would inevitably have produced

the same evidentiary result. But here the government is asking us to find inevitable

discovery where the police had mutually exclusive options and, for whatever
                                         30


reason, chose the option that turned out to be unlawful. The inevitable-discovery

doctrine does not apply in this type of situation. See Gore, 145 A.3d at 549 n.32

(―[T]he argument that ‗if we hadn't done it wrong, we would have done it right‘ is

far from compelling.‖ (quoting 6 LaFave, supra, § 11.4 (a)) (internal quotation

marks omitted)).32




      32
            Unlike our dissenting colleague, we are not persuaded by the
government‘s alternative argument that because Mr. Jones was carrying the stolen
phones, which could have been located and tracked lawfully (it is assumed), Mr.
Jones had no expectation of privacy in his location. This argument was not raised
in the initial briefing or in the trial court—it was first raised at oral argument
before this court in response to questions from the bench. Although after oral
argument we requested supplemental briefing on this argument, we ultimately
conclude that the government‘s failure to present it at an earlier stage constitutes a
waiver of the argument under the circumstances of this case. See Tuckson v.
United States, 77 A.3d 357, 366 (D.C. 2013); Rose v. United States, 629 A.2d 526,
535 (D.C. 1993); see also Greenlaw v. United States, 554 U.S. 237, 244 (2008)
(―We wait for cases to come to us, and when they do we normally decide only
questions presented by the parties. Counsel almost always know a great deal more
about their cases than we do, and this must be particularly true of counsel for the
United States, the richest, most powerful, and best represented litigant to appear
before us.‖ (quoting United States v. Samuels, 808 F.2d 1298, 1301 (8th Cir.
1987) (Arnold, J., concurring in denial of rehearing en banc))). In any case, the
argument is unpersuasive because, as we have explained above, ―[t]he fact that
equivalent information could sometimes be obtained by other means does not make
lawful the use of means that violate the Fourth Amendment.‖ Kyllo, 533 U.S. at 35
n.2; see also Maynard, 615 F.3d at 566. And as amici have cogently argued in
their supplemental submission, ―[c]onsidering as part of the reasonable-
expectation-of-privacy inquiry the availability of alternative means to gather
information would collapse inevitable discovery into the reasonable-expectation
question in a manner that would radically transform both doctrines.‖ As amici
explain, were we to adopt the government‘s—and the dissent‘s—novel theory of
                                                                       (continued…)
                                         31


                             C. Good-Faith Exception


      We turn next to the government‘s argument that application of the

exclusionary rule here ―would not meaningfully deter police misconduct‖ because

the use of the cell-site simulator to locate Mr. Jones was ―not the type of ‗flagrant‘

abuse for which the exclusionary rule was designed.‖ In support of this argument,

the government notes that Sergeant Perkins and his team believed ―exigent

circumstances existed‖ and asserts that ―at the time of this incident, no court had

held that using a simulator to locate a phone violates the Fourth Amendment.‖ The

government further points out that the police received judicial approval for various

secondary searches of the evidence recovered from Mr. Jones and Ms. Williams at

the time of Mr. Jones‘s arrest. Specifically, the police obtained warrants to search

Mr. Jones‘s Saturn and the phones they recovered from Mr. Jones and Ms.

Williams, and secured a court order to take a buccal swab from Mr. Jones.



       Although it does not explicitly say so, the government is invoking the



(…continued)
affirmance, ―the contours of the inevitable discovery doctrine, a carefully crafted
exception to the exclusionary rule with strict requirements, would be subject to
end-runs, because the possibility of an alternative means of discovery could often
be repackaged as a reason to reject an expectation of privacy in the first place‖
(citation omitted).
                                        32


―good-faith exception.‖ Davis v. United States, 564 U.S. 229, 239 (2011). The

Supreme Court first recognized this exception in United States v. Leon, 468 U.S.

897 (1984), holding that ―evidence obtained [by the police] in objectively

reasonable reliance on a subsequently invalidated search warrant‖ is not subject to

the exclusionary rule. Id. at 922. This holding was based on the premise that ―the

deterrence rationale [for exclusion] loses much of its force‖ ―when the police act

with an objectively reasonable good-faith belief that their conduct is lawful.‖

Davis, 564 U.S. at 252; id. at 238 (quoting Leon, 468 U.S. at 909, 919) (internal

quotation marks omitted). The Court has since extended the good-faith exception

to apply in various other situations involving nonculpable or merely negligent law-

enforcement conduct.     See, e.g., id. at 239–40 (holding that the good-faith

exception applies ―when the police conduct a search in objectively reasonable

reliance on binding judicial precedent‖); Herring, 555 U.S. at 136 (holding that the

good-faith exception applied to evidence obtained in a search incident to arrest

where the officer ―reasonably believe[d] there [wa]s an outstanding arrest warrant‖

for the defendant, but where ―that belief turn[ed] out to be wrong because of a

negligent bookkeeping error by another police employee‖).



      The Supreme Court has not, however, recognized the applicability of the

good-faith exception in a situation remotely like the present one—where the
                                             33


police, not acting pursuant to a seemingly valid warrant, statute, or court opinion,

conducted an unlawful search using a secret technology that they had shielded

from judicial oversight and public scrutiny. See supra note 26. Indeed, assuming

the police believed the warrantless use of the cell-site simulator to be lawful, they

could not have reasonably relied on that belief, given the secrecy surrounding the

device and the lack of law on the issue.33 And the government does not argue that

the police officers‘ mistaken belief that exigent circumstances existed was

reasonable or cite any case law that would support such an argument.



       The fact that some of the evidence was obtained in secondary searches

pursuant to warrants and a court order does not change things. The police‘s

reliance on the warrants and order was not objectively reasonable because the

warrants and order were based on information obtained in violation of Mr. Jones‘s

Fourth Amendment rights. See Evans v. United States, 122 A.3d 876, 886 (D.C.

2015) (―The subsequent issuance of [a] search warrant . . . , based on information

[illegally] obtained . . . , d[oes] not operate to attenuate the [original] illegality.‖). 34


       33
           The Supreme Court has implicitly foreclosed the government‘s argument
that police can reasonably conclude from the complete lack of judicial precedent
that their conduct is lawful. See Davis, 564 U.S. at 248 (suggesting that the good-
faith exception for police reliance on binding judicial precedent would not apply
where ―the precedent is distinguishable‖).
       34
            The government cites United States v. McClain, 444 F.3d 556 (6th Cir.
                                                                   (continued…)
                                         34


Thus, the evidence the police obtained through their warrantless use of the cell-site

simulator is not subject to the good-faith exception.



                   D. Change in Department of Justice Policy


      The government‘s final argument for not applying the exclusionary rule is

that a change in Department of Justice (DOJ) policy has diminished the likelihood

that excluding the evidence in this case will deter misconduct in the future. The

government asserts that the MPD is bound by a new DOJ policy to ―obtain a search

warrant supported by probable cause‖ before deploying a cell-site simulator. Dep‘t

of Justice Policy Guidance: Use of Cell-Site Simulator Technology at 3–4 (Sept.

3, 2015), https://www.justice.gov/opa/file/767321/download.

(…continued)
2006), in which the court declined to apply the exclusionary rule where officers
conducted a search pursuant to a warrant based in large part on information that
had been illegally gathered. This court‘s holding in Evans precludes us from
following McClain. And in any case, McClain is distinguishable because there the
―warrant affidavit fully disclosed to a neutral and detached magistrate the
circumstances surrounding the initial [illegal] search.‖ Id. at 566. Here, by
contrast, the police did not disclose in their applications for the warrants and order
that they had deployed a cell-site simulator to locate Mr. Jones. Indeed, in the
otherwise lengthy affidavit for the warrants, the officers‘ search for Mr. Jones is
described in a single sentence: ―[T]he Defendant was located by members of the
Washington, D.C. Metropolitan Police Department . . . .‖ The government cannot
rely on the Leon good-faith exception when the police have not been ―frank with
the magistrate in proceedings to obtain the warrant.‖ United States v. Reilly, 76
F.3d 1271, 1273 (2d Cir.), on reh’g, 91 F.3d 331 (2d Cir. 1996).
                                         35


      The government did not develop this argument in the trial court—and could

not have, as the DOJ policy had not yet been issued—and we do not find it

persuasive. The government has not cited any case in which a court has declined

to apply the exclusionary rule based on the government‘s representation that it will

not engage in unlawful conduct in the future. The government cites Blair v. United

States, 114 A.3d 960 (D.C. 2015), but in that case we relied on a change in a

statute that eliminated the need to deter subsequent violations, not a mere change

in policy. Id. at 973–74. And given that the DOJ policy memorandum does not

describe any sort of enforcement mechanism that would ensure compliance with

the policy, and given that the present administration or a subsequent one may well

revise this policy, we are not convinced that the need to deter future constitutional

violations is lacking.



                          E. Fruit of the Poisonous Tree


      Having decided that the exclusionary rule applies in this case, we must now

decide which evidence should be excluded as ―fruit of the poisonous tree‖ of the

illegal search.35   Wong Sun, 371 U.S. at 488.       In deciding whether evidence


      35
             In the trial court, Mr. Jones specifically moved to ―[s]uppress
[i]dentifications, [s]tatements, and [t]angible evidence‖ resulting from the illegal
search. The evidence and testimony that Mr. Jones identifies as fruits of the
                                                                      (continued…)
                                         36


constitutes fruit of the poisonous tree, the critical inquiry is whether ―the evidence

. . . has been come at by exploitation of th[e] illegality or instead by means

sufficiently distinguishable to be purged of the primary taint.‖ Wong Sun, 371 U.S.

at 488 (quoting John Maguire, Evidence of Guilt 221 (1959)); see also Wilson v.

United States, 102 A.3d 751, 753 (D.C. 2014). The court considers ―[t]he temporal

proximity of the [illegality] and the [acquisition of the evidence], the presence of

intervening circumstances, and, particularly, the purpose and flagrancy of the

official misconduct.‖ Brown v. Illinois, 422 U.S. 590, 603–04 (1975) (citations

and footnote omitted); see also Gordon v. United States, 120 A.3d 73, 85 (D.C.

2015).



      Mr. Jones argues that the following evidence and testimony should have

been excluded as fruits of the poisonous tree: his knife, a statement he made to the


(…continued)
poisonous tree in this appeal clearly fall within these categories, and the
government could not have reasonably doubted that Mr. Jones intended to have
them suppressed. The government had a ―full and fair opportunity‖ in the trial
court to litigate this matter. Barnett v. United States, 525 A.2d 197, 200 (D.C.
1987). And the record before us is ―of amply sufficient detail and depth‖ to permit
us to decide the scope of the exclusionary rule as a matter of law. Brown v.
Illinois, 422 U.S. 590, 604 (1975). We thus (except as to the testimony of Ms.
Williams, see infra note 41) decline the government‘s request that we remand the
case so that the trial court can ―hold hearings, make factual findings of fact, and
reach legal conclusions on the application of the fruit-of-the-poisonous-tree
doctrine.‖
                                         37


police at the scene of his arrest, cellphones recovered from Ms. Williams‘s purse at

the scene of the arrest, evidence (including cellphones) recovered from his car (the

Saturn) pursuant to a warrant, data extracted from the various cellphones pursuant

to warrants, the testimony of Ms. Williams, the later photo-array identification of

Mr. Jones by one of the complainants, a DNA profile generated from a buccal

swab of Mr. Jones (a month after his arrest), and a photograph of Mr. Jones‘s

groin.36 The government ―agrees that some, but not all, of the . . . evidence

[identified by Mr. Jones] is a fruit of the alleged poisonous tree.‖ The government

only specifically objects to classifying (1) Mr. Jones‘s statement to the police, (2)

the cellphones recovered from Ms. Williams‘s purse, and (3) Ms. Williams‘s

testimony as fruits of the poisonous tree.



                           1. Prince Jones’s Statement


      Mr. Jones made an incriminating statement to the police at the scene of the

arrest: When asked what his address was, Mr. Jones gave the address of one of the

sexual-assault complainants. The government argues that this statement should not

be suppressed as a fruit of the unlawful cell-site-simulator search because ―[i]t

      36
          One of the complainants testified at trial about the appearance of Mr.
Jones‘s genital area, and the photograph of Mr. Jones‘s groin was admitted in
evidence at trial.
                                         38


would make little sense to suppress evidence obtained merely as part of a routine

booking procedure.‖ See Thomas v. United States, 731 A.2d 415, 421 (D.C. 1999)

(recognizing ―a routine booking question exception‖ to the rule of Miranda v.

Arizona, 384 U.S. 436 (1966)). We reject this argument. That the question about

Mr. Jones‘s address was otherwise proper does not negate the fact that very little

time and no substantial intervening circumstances separated the illegal search from

Mr. Jones‘s incriminating response. See United States v. Olivares-Rangel, 458

F.3d 1104, 1112 (10th Cir. 2006). Mr. Jones‘s statement was a direct product of

the unlawful search and is thus excludable as fruit of the poisonous tree.



                   2. Cellphones from Nora Williams’s Purse


      When the police located Mr. Jones and Ms. Williams, they searched Ms.

Williams‘s purse and found several cellphones, including two of the complainants‘

phones and Mr. Jones‘s phone. The government argues that the contents of Ms.

Williams‘s purse are not fruits of the poisonous tree because Mr. Jones did ―not

have a reasonable expectation of privacy in the contents of Ms. Williams‘s purse‖

and because ―Ms. Williams gave the officers consent to search her purse.‖



      Preliminarily, Mr. Jones‘s expectation of privacy (or lack thereof) in Ms.

Williams‘s purse is not a material consideration in the fruit-of-the-poisonous-tree
                                            39


analysis. As one court has explained, ―[w]hile the fruit of the poisonous tree

doctrine applies only when the defendant has standing regarding the Fourth

Amendment violation which constitutes the poisonous tree, the law imposes no

separate standing requirement regarding the evidence which constitutes the fruit of

that poisonous tree.‖37 Olivares-Rangel, 458 F.3d at 1117 (citation omitted); see

also 6 LaFave, supra, § 11.4 (―If the defendant [has] standing with respect to the

poisonous tree, that alone suffices . . . .‖).


       The factors in Brown, 422 U.S. at 604, moreover, compel a conclusion that

the contents of Ms. Williams‘s purse are fruits of the poisonous tree. First, as the

search of Ms. Williams‘s purse occurred at the scene of Mr. Jones‘s apprehension

and arrest, very little time passed between the police‘s unlawful cell-site-simulator

search and their recovery of the evidence from Ms. Williams‘s purse.




       37
          United States v. Bowley, 435 F.3d 426, 430–31 (3d Cir. 2006), and United
States v. Pineda-Chinchilla, 712 F.2d 942, 943–44 (5th Cir. 1983), cited by the
government, stand only for the narrow proposition that a defendant cannot
suppress the contents of his immigration file even if the prosecuting authority‘s
discovery of that file or its connection to the defendant was based on evidence
gathered in an illegal search or seizure. Thus, even if we were to find these cases
persuasive, but see 6 LaFave, supra, § 11.4 & n.22, they would not support the
proposition that a defendant must always—or even usually—have standing in a
particular item of evidence to have it suppressed as a fruit of an illegal search or
seizure.
                                         40


      Second, Ms. Williams‘s supposed consent was not a significant intervening

circumstance. According to Detective Pulliam, Ms. Williams consented only after

the police presented her with the following options: the police ―would either have

to take the purse and put it into police custody until [they] could get a search

warrant and then search it or . . . she could give [the police] consent to search it.‖

Given this threat and the fact that her boyfriend, Mr. Jones, had just been arrested

in her presence, Ms. Williams‘s consent was not sufficiently ―the product of free

will [to] break . . . the causal connection between the illegality and the‖ search of

the purse. Brown, 422 U.S. at 603; cf. Utah v. Strieff, 136 S. Ct. 2056, 2062 (2016)

(holding that a valid arrest warrant ―entirely unconnected with the [illegal] stop‖

was a sufficient intervening circumstance); 4 LaFave, supra, § 8.2 (c) (explaining

that a person‘s consent to a search may be involuntary where the police, ―‗trading

on‘ a prior Fourth Amendment violation,‖ have ―threat[ened] to seek a warrant‖).38


      And third, although the police officers‘ warrantless use of the cell-site


      38
          The proper inquiry here is not whether Ms. Williams‘s consent was a
valid waiver of her own rights, but rather whether it constituted an intervening
circumstance sufficient to purge the taint of the illegal search. Thus, we need not
decide whether Ms. Williams could have had the evidence excluded had she
herself been tried. See generally 4 LaFave, supra, § 8.2 (c) (discussing Fourth
Amendment cases in which ―the police have obtained consent to search after
threatening that if consent were not given they would proceed to seek or obtain a
search warrant‖).
                                          41


simulator here was not flagrant misconduct,39 recovery of Mr. Jones‘s cellphone

and the complainants‘ phones was undoubtedly one of the officers‘ purposes in

deploying the cell-site simulator. The cell-site simulator is used to locate and track

phones after all. The contents of Ms. Williams‘s purse thus ―bear a . . . close

relationship to the underlying illegality.‖ Gordon, 120 A.3d at 85 (quoting New

York v. Harris, 495 U.S. 14, 19 (1990)).40



                         3. Nora Williams’s Testimony41


      Mr. Jones argues that Ms. Williams should have been barred from testifying


      39
           But see supra text accompanying note 33.
      40
          The government contends that even if the cellphones in Ms. Williams‘s
purse are fruits of the poisonous tree, the ―call detail records and location
information obtained from the provider‖ for the cellphones ―are not subject to
exclusion.‖ Mr. Jones has not argued otherwise, and we see no reason for
classifying this information as fruit of the poisonous tree.

      The government also represents in its brief that ―the government received an
unsolicited offender hit from the FBI‘s Combined DNA Index System (‗CODIS‘)
indicating that a sample obtained from [Mr. Jones] in connection with [a] prior
Maryland conviction matches the crime scene sample obtained in this case.‖
Assuming that the government can demonstrate this in the trial court, we agree
with the government that it ―should not be precluded from seeking another buccal
swab [from Mr. Jones] based on the independent and untainted CODIS hit.‖ This
CODIS hit would not be a fruit of the illegal search.
      41
         This part does not constitute the opinion of the court, as it is not joined by
Associate Judge THOMPSON or Senior Judge FARRELL.
                                         42


for the government at trial. The government disagrees, arguing that ―[t]here was

sufficient attenuation between the search and Ms. Williams‘s testimony to dissipate

any taint‖ and that ―the government would have inevitably discovered Ms.

Williams through independent sources.‖


      In United States v. Ceccolini, 435 U.S. 268 (1978), the Supreme Court

recognized factors pertinent to the determination of whether a witness‘s testimony

should be barred as fruit of the poisonous tree: (1) whether ―the testimony given by

the witness was an act of her own free will in no way coerced,‖ (2) whether

evidence gathered or information learned as a result of the illegal search was used

to question the witness, (3) whether ―[s]ubstantial periods of time elapsed between

the time of the illegal search and the initial contact with the witness . . . and

between the [initial contact] and the testimony at trial,‖ (4) whether the witness and

―her relationship with the [defendant] were well known‖ to the police before the

illegal search, and (5) whether the officers conducting the illegal search did so with

the ―intent of finding a willing and knowledgeable witness to testify against‖ the

defendant. Id. at 279–80; see also 6 LaFave, supra, § 11.4 (i). These factors

weigh in favor of excluding Ms. Williams‘s testimony.


      First, it is undisputed that Ms. Williams was not a willing witness for the

government.    As the government points out, Ms. Williams was initially ―not
                                            43


forthcoming about her knowledge and use of the . . . items‖ stolen from the

complainants, and only testified after ―the government sought and received a court

order granting her immunity.‖ Ms. Williams testified at trial that after she was

granted immunity, she testified for the grand jury ―[b]ecause [she] had no choice.‖

She expressed unhappiness about having to testify against Mr. Jones at trial, stating

that she ―didn‘t want to go against him.‖



      Second, the government admits that the police ―confronted [Ms. Williams]

with the fact that stolen phones and other items were recovered from her purse and

from the car.‖ This evidence, as explained above, was the product of the illegal

search. The government‘s attempt to minimize the significance of this fact is

unpersuasive.   The government contends that the ―illegally obtained evidence

ultimately did not play a great role in obtaining Ms. Williams‘s testimony‖ and that

it was the grant of immunity that was the decisive factor. But this argument fails to

address the fact that the police questioned Ms. Williams before she was

immunized, and is also speculative: It is plausible—indeed, likely—that both the

grant of immunity and fact that Ms. Williams was found red-handed with the

proceeds of the robberies played significant roles in her decision to testify.


      Third, a very short period of time passed between the illegal search and Ms.

Williams‘s first contact with the police. Indeed, Ms. Williams was present at Mr.
                                          44


Jones‘s arrest and was questioned at the scene. See United States v. Ramirez-

Sandoval, 872 F.2d 1392, 1397 (9th Cir. 1989). Approximately a year passed

between the police‘s initial contact with Ms. Williams and her testimony at trial,

but a lengthy period between first contact and trial is almost always present in a

criminal case, and this time period is less significant than the time period between

the search and first contact. Moreover, the witness‘s initial statements to the police

will often significantly constrain the witness‘s testimony at trial because the initial

statements can be used to impeach the witness or bolster his or her testimony. See

1 Kenneth S. Broun et al., McCormick on Evidence § 34 (7th ed. 2016) (discussing

the procedure of impeaching a witness with a prior inconsistent statement); id. § 47

(discussing the procedure of supporting a witness with a prior consistent

statement).



      Fourth, although at trial the government offered in evidence surveillance

footage of Ms. Williams using an ATM card stolen from one of the complainants,

at the suppression hearing the government neither presented evidence nor argued

that the police had this video before they conducted the illegal cell-site-simulator

search or that the video would have enabled the police to locate Ms. Williams.

Thus, based on the record before the court, it is not possible to conclude that the

police were aware of Ms. Williams or her relationship with Mr. Jones before they
                                           45


located her through the illegal search. See also supra note 35.


      The remaining factor favors the government. Specifically, there is no reason

to believe that the police intended their use of the cell-site simulator to result in the

discovery of a witness for the government. Rather, the record before the court

suggests that the police were trying to locate Mr. Jones—and, as a necessary

consequence of their use of cellphone tracking, Mr. Jones‘s cellphone.

Nonetheless, because the other four factors strongly weigh in favor of suppression,

there is ―a close[], . . . direct link between the illegality and [Ms. Williams‘s]

testimony.‖ Ceccolini, 435 U.S. at 278.



                            F. Harmless-Error Analysis


      The introduction of evidence collected in violation of Mr. Jones‘s Fourth

Amendment right to be free from unreasonable searches and seizures is

constitutional error.   So we must reverse Mr. Jones‘s convictions unless the

government has ―prove[d] beyond a reasonable doubt that the error . . . did not

contribute to the verdict.‖     Chapman v. California, 386 U.S. 18, 24 (1967).

Because we have concluded that the fruits identified by Mr. Jones should have
                                        46


been excluded at his trial,42 and because these fruits comprised some of the most

damning evidence against him, we need not undertake a detailed analysis to

conclude that the erroneous admission of these fruits at trial was not harmless

beyond a reasonable doubt. The government does not argue otherwise.



                                 III. Conclusion


      For the foregoing reasons, we reverse the judgment of the trial court and

remand for further proceedings consistent with this opinion.




      42
          To be entirely accurate, we have reached this conclusion with respect to
all of the purported fruits except for the testimony of Ms. Williams. See supra
note 41. The conclusion that the error was not harmless beyond a reasonable doubt
nonetheless stands.
                                        47


      FARRELL, Senior Judge, concurring in part and concurring in the judgment:

I agree with Judge Beckwith that the police‘ use of the cell-site simulator to

discover appellant‘s precise location violated the Fourth Amendment because it

was a ―search‖ requiring a warrant. My analysis of why that is so is more limited

than Judge Beckwith‘s, however. I also agree that the government has not shown

that the fruits of the use of the simulator would have been inevitably discovered by

lawful means, and that this is not the sort of case in which the Supreme Court has

found that suppression of the fruits would serve no deterrent purpose. Further,

except that I would not decide whether the testimony of Nora Williams should

have been suppressed, I agree that the evidence discussed in part II. E. of Judge

Beckwith‘s opinion was suppressible fruit of the warrantless search. Finally, I

explain briefly why I am not persuaded by Judge Thompson‘s position in dissent

that no search at all under the Fourth Amendment took place.



                                         I.


      As to inevitable discovery, a key argument by appellee in its original brief, I

agree that the government has failed to show the ―requisite actuality,‖ Hicks v.

United States, 730 A.2d 657, 659 (D.C. 1999), that tracking the complainants‘

cellphones with the simulator, had that taken place, would have led to the same

seizure of incriminating evidence.      The government in its brief states that
                                         48


appellant‘s and the complainants‘ cellphones ―were ultimately found together in

appellant‘s car,‖ and that since ―the simulator was close enough to locate one of

the phones, it inevitably was close enough to locate the other‖ (Appellee‘s Brief at

32). But this analysis is troublesome partly because it relies on the fruits of the

actual simulator use. See 6 WAYNE R. LAFAVE, Search and Seizure: A Treatise on

the Fourth Amendment § 11.4 (a), at 283 (5th ed. 2016) (―‗[T]he fact making

discovery inevitable must arise from circumstances other than those disclosed by

the illegal search itself.‘‖). Moreover, the police began using the simulator a

considerable length of time after appellant had come into possession of the

complainants‘ cellphones, and even then some 30–45 minutes elapsed before the

simulator directed them to appellant‘s car and cellphone. So there is too much

surmise, I submit, in the reasoning that if the police had used the simulator to

locate the complainants‘ phones instead, those phones would still have been in

appellant‘s possession or, if so, in a powered-on condition enabling their detection.



                                         II.


      The dispositive issue, then, is whether the use of the cell-site simulator was a

―search‖ requiring the police to have obtained a warrant beforehand (in the now-

conceded absence of exigent circumstances). To answer that question it is enough,

I believe, to know how the simulator learns of a target cellphone‘s location. It does
                                          49


so by effectively commandeering the cellphone as a police investigative tool in the

way Judge Beckwith describes, namely, by ―actively induc[ing] the phone to

divulge its identifying information,‖ ante at 17, from which the phone‘s direction

and distance relative to the simulator can be determined.             This process of

―grabbing‖ the target phone and making it the instrument of its own locational

disclosure explains why the government‘s primary reliance on the third-party

doctrine of Smith v. Maryland, 442 U.S. 735 (1979)—―Smith . . . is controlling

here‖ (Appellee‘s Brief at 23)—to argue that appellant had no reasonable

expectation of privacy in the police‘ use of his phone is unpersuasive.



      Smith held that an individual enjoys no Fourth Amendment protection ―in

information he voluntarily turns over to [a] third part[y].‖ Id. at 743–44. The

reason is that by ―revealing his affairs to another‖ an individual ―takes the risk . . .

that the information will be conveyed by that person to the government.‖ United

States v. Miller, 425 U.S. 435, 443 (1976). Recently the Fourth Circuit applied the

third-party doctrine to hold that the government‘s acquisition of historical cell-site

location information (CSLI) from a suspect‘s cellphone provider is not a search

under the Fourth Amendment. United States v. Graham, 824 F.3d 421 (4th Cir.

2016) (en banc). Although that issue remains an open one in this court, and the

Supreme Court is expected to decide it this term, Carpenter v. United States, No.
                                        50


16-402, cert. granted June 5, 2017, Graham‘s analysis at least serves by

comparison to show why the use of a cell-site simulator to locate appellant‘s phone

compels a different conclusion.1


      Graham distinguished prior Supreme Court cases involving ―direct

government surveillance‖ (e.g., United States v. Karo, 468 U.S. 705 (1984); United

States v. Jones, 565 U.S. 400 (2012)) from the situation where the government

―obtains, from a third party, the third party‘s records, which permit the government

to deduce location information.‖ 824 F.3d at 426. Because CSLI is information

the individual has already ―‗exposed‘ . . . to the phone company‘s ‗equipment in

the ordinary course of business,‘‖ that person has ―‗assumed the risk‘ that the

phone company would disclose their information to the government.‖ Id. at 427-

28 (quoting Smith, 442 U.S. at 744). The government thus ―does not engage in a

Fourth Amendment ‗search‘ when it acquires‖ CSLI from the cellphone provider.

Id. at 427. But in contrast to this passive ―acquir[ing]‖ or ―obtain[ing]‖ of CSLI,

direct government surveillance of a cellphone does constitute a search, as when —

the Fourth Circuit observed by footnote — ―the government uses cell-site

      1
          The fact that the Supreme Court will take up cell phone technology in
relation to the Fourth Amendment is alone reason for us to decide the present issue
narrowly and not opine in broad stokes about privacy and electronic information,
locational or other.
                                        51


simulators . . . to directly intercept CSLI instead of obtaining CSLI records from

phone companies.‖ Id. at 426 n.4



      When the police seek and obtain locational information by directly

interacting with, indeed by taking functional control of, a suspect‘s cellphone

through a simulator, it cannot reasonably be said that the phone user has

―voluntarily conveyed‖ locational information to anyone and thereby relinquished

a reasonable expectation of privacy in the information. Smith, 442 U.S. at 744.

Police requests for cellphone location data held by a third party, however the

Supreme Court resolves that privacy issue, are not comparable to forcing a

cellphone to disclose its own identifying data. The police located appellant‘s

phone by effectively making it a self-investigative tool. Any reduced expectation

of privacy an individual accepts by entering the cellphone world does not extend to

co-optation of that kind.



                                        III.


      I also agree that suppression of most of the fruits of the unlawful search here

will ―pay its way,‖ United States v. Leon, 468 U.S. 897, 919 (1984), under the

―cost-benefit analysis in exclusion cases.‖ Davis v. United States, 564 U.S. 229,

238 (2011). As Judge Beckwith points out, the government has not sought to show
                                           52


that any belief the police had that there was no time to pursue a search warrant was

objectively reasonable, albeit mistaken. The record suggests, to the contrary, that

the police decided to forgo the warrant process either believing — unreasonably, in

the virtual absence of relevant court decisions—that no Fourth Amendment

intrusion was involved or to honor a proprietary agreement for secrecy in using the

device. See ante at 22 n.26. Thus, the search cannot be said to have involved the

sort of ―‗isolated,‘ ‗nonrecurring‘ police negligence . . . [that] lacks the culpability‖

required to justify suppression, Davis, 564 U.S. at 239 (citing Herring v. United

States, 555 U.S. 135, 137 (2009)), even if it entailed no ―‗deliberate,‘ ‗reckless,‘ or

‗grossly negligent‘ disregard for Fourth Amendment rights.‖ Davis, 564 U.S. at

238. The unlawfulness here was not like the ―err[or] in maintaining records in a

warrant database,‖ id. at 239, involved in both Arizona v. Evans, 514 U.S. 1

(1955), Herring, supra; nor was it comparable to the mistaken but ―objectively

reasonable reliance on binding judicial precedent‖ in Davis, 564 at 239.



      Exclusion of evidence was thus a proper remedy here, except that, unlike

Judge Beckwith, I would not decide whether the testimony of Nora Williams

should have been suppressed. Her testimony was given more than a year after the

illegal search and only after, now represented by counsel, she had received use

immunity for her testimony. Those circumstances present a difficult question of
                                        53


attenuation that we need not reach, because the admission of the immediate fruits

of the search was not harmless error and requires reversal. In any new trial the

parties can brief and the trial court resolve the issue of the admissibility of

Williams‘ testimony, should the issue arise.


      Finally, I am not persuaded by Judge Thompson‘s position in dissent that no

Fourth Amendment search took place because appellant had no ―reasonable

expectation that the location of his cell phone would remain private while he was

traveling on the public roads with a powered-on, stolen cell phone.‖ Post at 68

(emphasis added). That contention, resting on appellant‘s presumed awareness of

how the police might have located him (via the stolen cell phone) but did not,

closely resembles the inevitable discovery argument we have rejected.           See

Appellee‘s Supp. Brief at 6 (―[A]ppellant has effectively conceded that the use of a

cell site simulator to locate the stolen Sprint cell phone would have been a ‗lawful

investigative process‘‖ (emphasis added)).      Moreover, the theory appears to

assume a conclusion of wrongdoing—that appellant possessed a ―stolen‖ phone—

disputed by appellant‘s not-guilty plea at the time the suppression motion was

litigated.2 It would be unfair to hold that, in moving to suppress the fruits of the


      2
          In McFerguson v. United States, 770 A.2d 66 (D.C. 2001), this court
rejected the argument that ―society would [not] impute a reasonable expectation of
                                                                    (continued…)
                                          54


search of his cell phone, appellant assumed the burden of proving that his

possession of another‘s phone was lawful—the issue of guilty possession vel non

on which the government would have the burden of proof at trial. The dissent‘s

ingenious argument for why no search took place is too fraught with difficulty to

provide a basis for admitting in evidence the fruits of the warrantless manipulation

of appellant‘s cell phone.



      THOMPSON, Associate Judge, dissenting: My colleagues in the majority are

―properly and commendably concerned about the threats to privacy that may flow

from advances in the technology available to the law enforcement profession.‖ 1 I

share their concern, but I am not persuaded to their conclusion in this case, which I

believe rests on a too-generic description of the facts surrounding use of the cell-

site simulator involved here. My colleagues express concern that ―[a] cell-site

simulator allows police officers who possess a person‘s telephone number to

discover that person‘s precise location remotely and at will.‖ Ante at 17. But this

(…continued)
privacy to a burglar running away from the crime scene carrying in plain view a
distinctively marked shopping bag . . . stolen from the burgled residence and filled
with the victim‘s property.‖ Id. at 71 (internal quotation marks and ellipses
omitted). The government‘s argument, we said, ―assumes the very facts that were
to be proved at trial — that [the defendant] was fleeing with goods he had stolen in
the burglary.‖ Id.
      1
          Kyllo v. United States, 533 U.S. 27, 51 (2001) (Stevens, J., dissenting).
                                         55


case is about far more particular and narrow facts, and here, as always, Fourth

Amendment analysis must be ―extremely fact-specific‖;2 ―[i]t is important to be

clear about what occurred in this case[.]‖3


      Described with the necessary specificity, this case is about the following:

Police had near real-time cell-site location information from cell phone providers4

that a cell phone, which police knew (from a review of victim call records) had

been used by the perpetrator of two recent sexual assaults and related robberies to

lure his victims, was traveling on the public streets together with a powered-on5

Sprint cell phone (the ―stolen phone‖) that the perpetrator had stolen from one of

the robbery victims, and was in the vicinity of the Minnesota Avenue Metro


      2
        In re Application of United States for Historical Cell Site Data, 724 F.3d
600, 603 (5th Cir. 2013) (internal quotation marks omitted).
      3
          United States v. Jones, 565 U.S. 400, 404 (2012).
      4
         As the majority opinion notes, ante at 16 n.20, appellant has not argued in
this appeal that his Fourth Amendment rights were violated when the government
obtained cell-site location information from cellular providers. See United States
v. Graham, 824 F.3d 421, 428 (4th Cir. 2016) (joining other circuit courts in
holding that ―individuals do not have a reasonable expectation of privacy in
historical [cell-site location information] that the government obtains from cell
phone service providers‖).
      5
         Police Technical Services Unit (―TSU‖) Sergeant Perkins testified at the
suppression hearing in this case that, as long as it‘s ―powered on,‖ a cell phone ―is
constantly transmitting to and receiving from a tower.‖
                                         56


station; and, after driving to the area near that station, law enforcement officers

using a cell-site simulator (over a period of 30 to 45 minutes) were led to a row of

cars parked on the street near the Metro station and thence to the sole occupied car,

in which appellant sat with the stolen cell phone in his possession.6


      I can agree with my colleagues that ―under ordinary circumstances,‖ ante at

20, the government‘s use of a cell-site simulator to locate an individual through the

individual‘s cellphone likely violates the legitimate expectation of privacy we all

have in our location information.7 I would also agree that ―individuals have a

reasonable expectation of privacy in their location information when they are

tracked in a space, like the home, that is traditionally protected or when they are

tracked for a longer period of time and in greater detail than society would expect.‖

Historical Cell Site Data, 724 F.3d at 608 (describing a contention by the ACLU).

But I do not believe it is fair to regard the particular circumstances of this case,

which I have described above, as ―ordinary circumstances.‖ And as the facts of


      6
          Actually, at the time appellant was arrested, he had in his car all four
stolen cell phones involved in this case.
      7
         I acknowledge that some courts have so held. See, e.g., United States v.
Ellis, No. 13-CR-00818 PJH, 2017 U.S. Dist. LEXIS 136217, *20 (N.D. Cal. Aug.
24, 2017) (―[C]ell phone users have an expectation of privacy in their cell phone
location in real time and . . . society is prepared to recognize that expectation as
reasonable.‖).
                                          57


this case (1) do not involve the privacy of the home;8 (2) did not entail long-term

tracking that could reveal appellant‘s private information about the places he

frequents;9 (3) did not entail a physical intrusion or a physical trespass to any


      8
          That fact distinguishes this case from cell-site simulator cases on which
appellant relies. See State v. Andrews, 134 A.3d 324 (Md. Ct. Spec. App. 2016),
and United States v. Lambis, 197 F. Supp. 3d 606, 609 (S.D.N.Y. 2016). In
Andrews, police used a cell-site simulator to locate Andrews, who was wanted on
charges of attempted murder, and tracked him to a location inside a residence,
where he was arrested. 134 A.3d at 326. The court cited its concern that the cell-
site simulator had ―been used to obtain information about the contents of a home,
not otherwise discernable without physical intrusion.‖ Id. at 349. The court stated
that ―people have a reasonable expectation that their cell phones will not be used as
real-time tracking devices by law enforcement‖ and ―an objectively reasonable
expectation of privacy in real-time cell phone location information.‖ Id. at 327. In
Lambis, the Drug Enforcement Administration used a cell-site simulator to locate
Lambis‘s apartment, conduct that the court found to be an unreasonable search
because ―[t]he home has special significance under the Fourth Amendment.‖ 197
F. Supp. 3d at 609–10. These cases are consistent with the principle that, ―[w]ith
few exceptions, the question whether a warrantless search of a home is reasonable
and hence constitutional must be answered no.‖ Kyllo, 533 U.S. at 31 (observing
that ―[a]t the very core of the Fourth Amendment stands the right of a man to
retreat into his own home and there be free from unreasonable governmental
intrusion‖ (internal quotation marks omitted)).
       In this case, the cell-site simulator alerted the officers that appellant‘s phone
was located in the 4000 block of Minnesota Avenue, N.E., a block on which there
were several businesses, a District of Columbia government building, and a Metro
station. There appears to be no evidence in the record that there were residential
buildings in the block, but amici note that a large apartment building is also located
on the block, at 4020 Minnesota Avenue. There appears to be no evidence in the
record that the cell-site simulator came within range of that apartment building as
the officers were ―coming down southbound Minnesota [Avenue].‖
      9
           See Graham, 824 F.3d at 435 (noting that in Jones, ―the concurring
justices recognized a line between ‗short-term monitoring of a person‘s movements
                                                                     (continued…)
                                          58


property of appellant;10 and (4) did not involve a search of the contents of



(…continued)
on public streets,‘ which would not infringe a reasonable expectation of privacy,
and ‗longer term GPS monitoring,‘ which would‖ (quoting Jones, 565 U.S. at
430)). The concern is that long-term historic location information can reveal ―a
wealth of detail about [an individual‘s] familial, political, professional, religious,
and sexual associations.‖ Jones, 565 U.S. at 415 (Sotomayor, J., concurring); id. at
430 (Alito, J., concurring in judgment) (―[T]he use of longer term GPS monitoring
[over a period of twenty-eight days in Jones‘s case] in investigations of most
offenses impinges on expectations of privacy.‖); cf. United States v. Riley, 858
F.3d 1012, 1013 (6th Cir. 2017) (tracking of fugitive‘s real-time GPS location data
for approximately seven hours did not amount to a Fourth Amendment search).
      10
         A trespassory search implicating the Fourth Amendment occurs when the
government ―gains evidence by physically intruding on constitutionally protected
areas.‖ Florida v. Jardines, 569 U.S. 1, 16 (2013).

       Appellant and the majority opinion cite cases suggesting that use of a cell-
site simulator could constitute trespass to chattels, ante at 24–25 n.27, but my
colleagues do not rely on that case law for their conclusion. Moreover, as Justice
Alito noted in his concurrence in the judgment in Jones, ―today there must be some
actual damage to the chattel before [an] action [for trespass to chattels] can be
maintained.‖ 565 U.S. at 419 n.2 (Alito, J., concurring in judgment) (internal
quotation marks omitted); see also Restatement (Second) of Torts § 218 cmt. (e)
(1965) (stating that, generally, ―one who intentionally intermeddles with another‘s
chattel is subject to liability only if his intermeddling is harmful to the possessor‘s
materially valuable interest in the physical condition, quality, or value of the
chattel, or if the possessor is deprived of the use of the chattel for a substantial
time‖). If arguendo use of the cell-site simulator in this case (which, according to
the evidence, may have caused calls that appellant tried to initiate to be dropped)
did constitute a trespass, I do not believe we could reasonably conclude that the
police were culpable in failing to recognize it as such (and thus I believe we would
have no occasion to apply the exclusionary rule). See Herring v. United States,
555 U.S. 135, 141, 143 (2009) (confirming that ―exclusion has always been our
last resort, not our first impulse‖ and that the Court has ―never suggested that the
exclusionary rule must apply in every circumstance in which it might provide
marginal deterrence,‖ and stating that ―[t]he extent to which the exclusionary rule
                                                                         (continued…)
                                             59


appellant‘s cell phone that could have exposed his private information,11 I am

unpersuaded that there was a Fourth Amendment violation in this case.



      In the pages that follow, I will explain my reasoning in more detail. But

first, I must address a preliminary issue.



                                        I.


      After oral argument in this matter, this court directed the parties to submit

supplemental briefs on the following issue:


             What reasonable and legitimate expectation of privacy

(…continued)
is justified . . . varies with the culpability of the law enforcement conduct.‖)
(internal quotation marks omitted). And, as discussed infra, even if police
interfered with the operation of appellant‘s ―chattel‖ when the cell-site simulator
―grabbed‖ his cell phone remotely and rendered it temporarily non-operational for
making calls, police were justified in effecting that seizure of appellant‘s cell
phone under the automobile exception to the warrant requirement.
      11
           ―[C]oncerns about a general ‗erosion of privacy‘ with respect to cell
phones . . . revolve around protecting the large quantity of information stored on
modern cell phones and on remote servers like the ‗cloud.‘ If all that information
were indeed at risk of disclosure [through the government‘s obtaining cell-site
location information], we would share this concern.‖ Graham, 824 F.3d at 434
n.13 (internal citation omitted). Documents, however, ―stored on phones and
remote servers are protected, as ‗content,‘ in the same way that the contents of text
messages or documents and effects stored in a rented storage unit or office are
protected.‖ Id.
                                          60


             does a person have in his or her location information
             when the person possesses (outside his or her residence)
             a stolen cell phone capable of being located by a cell-site
             simulator or through real-time cell site location
             information available to the cell phone owner or his or
             her telecommunications provider?

      Asserting that the issue the court raised was waived by the government,

appellant argues in his supplemental brief that ―waiver rules preclude this court

from affirming the trial court‘s ruling on an alternative ground that the government

did not raise at trial or on appeal.‖ I disagree in the strongest terms.12 Fourth

Amendment suppression issues are serious issues.          In this case, the evidence

sought to be suppressed relates to serial sexual assaults and robberies at knifepoint

(with use of a knife that the assailant — confirmed by DNA evidence to be

appellant — was still carrying on his person at the time he was stopped by police).

We have a duty to analyze for ourselves the antecedent question of whether, on the
      12
           Appellant is also incorrect in suggesting that the court directed briefing
on an issue entirely absent from the government‘s initial brief in this court and its
arguments in the trial court. The government argued in its opening brief to us that
in cases cited by appellant, ―the cell-site simulator located the defendant‘s phone
inside a home, thus implicating Fourth Amendment privacy concerns not raised
here.‖ Our inquiry about the significance of the fact that appellant possessed the
stolen cell phone outside his residence reflected in part that argument. Our inquiry
also reflected the prosecutor‘s repeated argument (to which she mistakenly referred
as involving application of the ―inevitable discovery‖ doctrine) to the trial court
that suppression was not warranted because there was ―a separate, lawful way
[police] could have gotten to the same thing‖ (emphasis added) — i.e., use of the
cell-site simulator to target the stolen cell phone that was traveling with appellant‘s
phone.
                                         61


particular facts of this case, use of the technology by which appellant was located

constituted a search (and, if so, whether it was a lawful search). In this case as

always, this court‘s task is to ―consider[] the briefs and the oral argument, and [to]

test[] them against the record and the law,‖ Watson v. United States, 536 A.2d

1056, 1068 (D.C. 1987) (en banc), not merely to choose the better or best of the

arguments presented in support of a claim. Our responsibility as an appellate court

is to decide cases in accordance with the law, and that responsibility is not to be

diluted by how counsel have framed the issues or by limitation to the specific

authorities counsel have cited.



      The Supreme Court‘s decision in United States National Bank of Oregon v.

Independent Insurance Agents of America, Inc., 508 U.S. 439 (1993), is

instructive. That litigation commenced after the Comptroller of the Currency

issued a ruling allowing the United States National Bank of Oregon ―to sell

insurance through its branch in Banks, Oregon.‖ Id. at 443. Trade organizations

challenged the Comptroller‘s decision, arguing, inter alia, that it was inconsistent

with section 92, a statutory provision enacted in 1916 that ―permit[ted] banks

located in small communities to sell insurance to customers outside those

communities.‖ Id. at 441, 444. The District Court granted summary judgment in

favor of the Comptroller, finding that ―the Comptroller‘s interpretation was
                                          62


rational and consistent with section 92.‖ Id. at 444 (internal quotation marks and

alterations omitted). On appeal, the trade organizations did not ask the Court of

Appeals for the District of Columbia to rule that section 92 no longer existed (it

had been repealed in 1918), and they did not take a position on the issue during

oral argument or in supplemental briefing. Nevertheless, reasoning that it had ―a

‗duty‘ to [decide the issue],‖ the Court of Appeals determined that section 92 had

been repealed. Id. at 444-45 (quoting Indep. Ins. Agents of America, Inc. v. Clarke,

955 F.2d 731, 734 (D.C. Cir. 1992)).



      The case went to the Supreme Court, which concluded that ―[t]he Court of

Appeals . . . had discretion to consider the validity of section 92,‖ and ―did not

stray beyond its constitutional or prudential boundaries‖ in doing so. Id. at 447.

The Court explained that ―[t]hough the parties did not lock horns over the status of

section 92, they did clash over whether the Comptroller properly relied on section

92 as authority for his ruling,‖ and the Court of Appeals was not obliged ―to treat

the unasserted argument that section 92 had been repealed as having been waived.‖

Id. at 446-47. The Court confirmed that ‗―when an issue or claim is properly

before the court, the court is not limited to the particular legal theories advanced by

the parties, but rather retains the independent power to identify and apply the

proper construction of governing law.‖‘ Id. at 446 (internal alterations omitted)
                                          63


(quoting Kamen v. Kemper Fin. Servs, Inc., 500 U.S. 90, 99 (1991)). The Court

further instructed that ―a court may consider an issue ‗antecedent to and ultimately

dispositive of‘ the dispute before it, even an issue the parties fail to identify and

brief.‖ Id. at 446-47 (internal alterations omitted) (quoting Arcadia v. Ohio Power

Co., 498 U.S. 73, 77 (1990)).



      Our court has applied the guidance of National Bank of Oregon in various

circumstances. For example, in Martin v. United States, 952 A.2d 181(D.C. 2008),

after requesting supplemental briefs from the parties, we reached the question of

whether the police had unlawfully entered Martin‘s home in violation of the Fourth

Amendment, even though ―appellate counsel [had] failed to argue that the entry

itself constituted an unlawful search either in his principal brief or at oral

argument.‖ Id. at 188–89.13 Our sister court, the United States Court of Appeals


      13
           See also Anthony v. United States, 935 A.2d 275, 282 n.10 (D.C. 2007)
(―But no matter whose ox is gored when the parties are directed by the court to file
supplemental submissions, ‗this court has frequently requested post-argument
briefing of issues not adequately raised by counsel, to the end that, after both
parties have been fully heard, the court is in the best position to render a sound
decision.‘‖ (quoting Randolph v. United States, 882 A.2d 210, 226 (D.C. 2005));
Outlaw v. United States, 632 A.2d 408, 410–11 (D.C. 1993) (declining to reach the
question briefed by the parties — ―whether one may be convicted of being an
accessory after the fact to murder on the basis of actions taken while the decedent
was still alive‖ — and instead, after requesting and receiving supplemental
briefing, ruling based on an issue the panel raised for the first time at oral argument
— ―whether the evidence was sufficient to support [appellant‘s] conviction of
                                                                          (continued…)
                                         64


for the District of Columbia Circuit, has also considered the merits of issues the

parties did not raise. See United States v. Maynard, 615 F.3d 544, 560–61 (D.C.

Cir. 2010) (―The Government does not separately raise, but we would be remiss if

we did not address, the possibility that although the whole of Jones‘s movements

during the month for which the police monitored him was not actually exposed to

the public, it was constructively exposed because each of his individual

movements during that time was itself in public view.‖).14




(…continued)
[accessory after the fact] to any offense whatever‖); cf. Randolph, 882 A.2d at
217–18 (‗―Once a claim is properly presented to the trial court, a party can make
any argument in the appellate court in support of that claim[, and] parties are not
limited to the precise arguments made below.‖‘ (internal alterations omitted)
(quoting West v. United States, 710 A.2d 866, 868 n.3 (D.C. 1998)); see also id. at
227 (determining that ―the judgment should be affirmed on harmlessness grounds,
notwithstanding the government‘s initial failure to argue that the trial court‘s error
was harmless‖).
      14
           See also Lesesne v. Doe, 712 F.3d 584, 588 (D.C. Cir. 2013) (noting that
the Supreme Court ―has recognized that ‗there may always be exceptional cases or
particular circumstances which will prompt a reviewing or appellate court, where
injustice might otherwise result, to consider questions of law which were neither
pressed nor passed upon by the court or administrative agency below,‖‘ and
determining that ―the proper interpretation of [the Prison Litigation Reform Act‘s]
exhaustion requirement is a dispositive legal issue antecedent to its application‖
(internal alterations omitted) (quoting Hormel v. Helvering, 312 U.S. 552, 557
(1941))); United States v. Pryce, 938 F.2d 1343, 1348 (D.C. Cir. 1991) (―Only if
one adopts an absolutist approach to the adversary system can one contend that
courts must never address unargued issues, no matter how obvious their proper
resolution may be. Certainly the Supreme Court rejects such an approach.‖).
                                         65


      In short, case law does not bind us to the approach of addressing only the

arguments the parties have framed.       The Supreme Court has not followed or

dictated that approach,15 our neighbor the United States Court of Appeals for the

District of Columbia Circuit has rejected it, and numerous other federal circuit

courts of appeals have said that they have discretion on direct appeal to consider

arguments a party has failed to make.16 The bottom line is that appellate courts

―regularly and frequently consider sua sponte authorities not cited and grounds of

decision not raised.‖17


      15
           Commentators have frequently mentioned that in Erie Railroad Co. v.
Tompkins, 304 U.S. 64 (1938), the issue the Court resolved — whether ―in
diversity cases the substantive law of the state of trial must be applied‖ — ―had not
been raised by the parties before either the lower courts or the Supreme Court.‖
Albert Tate, Jr., Sua Sponte Consideration on Appeal, 9 TRIAL JUDGES J. 68
(1970), reprinted in APPELLATE JUDICIAL OPINIONS 128 (Robert A. Leflar ed.,
1974); see also Singleton v. Wulff, 428 U.S. 106, 121 (1976) (―The matter of what
questions may be taken up and resolved for the first time on appeal is one left
primarily to the discretion of the courts of appeals, to be exercised on the facts of
individual cases. We announce no general rule.‖).

      16
          See, e.g., United States v. Rose, 104 F.3d 1408, 1414 (1st Cir. 1997) (―We
join several other circuit courts of appeals in holding that appellate courts have the
discretion on direct appeal to overlook the government‘s failure to argue that the
admission of the challenged evidence, if error, was harmless, and that appellate
courts may therefore consider the issue of harmlessness sua sponte.‖) (collecting
cases).
      17
          Albert Tate, Jr., supra note 15, at 127; see also Estate of Girard v. Laird,
621 A.2d 1265, 1268 n.3 (Vt. 1993) (citing the Tate article in explaining why the
court may ―reach[] results for reasons different than those argued by the parties‖);
State v. Weber, 471 N.W.2d 187, 199 n.7, 200 (Wis. 1991) (citing the Tate article
                                                                        (continued…)
                                        66


      When we review denials of motions to suppress, ―our role is [essentially] to

ensure that the trial court had a substantial basis for concluding that no

constitutional violation occurred.‖ Brown v. United States, 590 A.2d 1008, 1020

(D.C. 1991). ―We must determine whether the court‘s denial of the motion to

suppress is sustainable under any reasonable view of the evidence,‖ and ―[i]t is

well settled that [we] may affirm a decision for reasons other than those given by

the trial court.‖ Alston v. United States, 518 A.2d 439, 440 n.2 (D.C. 1986). Thus,

in this case, we have a duty to study carefully the particular facts of the case to

determine for ourselves whether the trial court‘s denial of appellant‘s motion to

suppress is sustainable.   This means that we have not only the discretion to

consider, but an obligation to consider whether appellant had a reasonable and

legitimate expectation of privacy in his location information when (as the

supplemental briefing order described and among other material facts discussed

below) he ―possesse[d] (outside his . . . residence) a stolen cell phone capable of

being located by a cell-site simulator or through real-time cell-site location

information available to the cell phone owner or his . . . telecommunications

provider.‖

(…continued)
in justifying its decision upholding the reasonableness of a search under the Fourth
Amendment on grounds that, according to the dissenting justice, the State ―was
aware of . . . but did not argue . . . in this court‖).
                                          67


      As explained in the discussion below, ―the antecedent question of whether

there [wa]s a Fourth Amendment ‗search‘ at all‖18 turns on resolution of that issue

(which, on the facts presented here, is ultimately dispositive of the case). And

even if arguendo use of the cell-site simulator constituted a ―search‖ for Fourth

Amendment purposes, application of the automobile exception to the Fourth

Amendment warrant requirement requires affirmance of the trial court‘s denial of

the motion to suppress.


                                        II.


      The Fourth Amendment protects ―[t]he right of the people to be secure in

their persons, houses, papers, and effects, against unreasonable searches and

seizures.‖ U.S. Const. amend. IV. Thus, in analyzing a Fourth Amendment claim,

the threshold issue is whether there has been a ―search‖ or ―seizure.‖          That

―antecedent question whether or not a Fourth Amendment ‗search‘ has occurred is

not so simple under [Supreme Court] precedent.‖ Kyllo, 533 U.S. at 31. The

fundamental principle, however, is that ―a Fourth Amendment search does not

occur . . . unless the individual manifested a subjective expectation of privacy in

the object of the challenged search, and society is willing to recognize that


      18
           Riverdale Mills Corp. v. Pimpare, 392 F.3d 55, 63 (1st Cir. 2004).
                                        68


expectation as reasonable.‖ Id. at 33 (internal quotation marks and alterations

omitted). ―[W]hether an expectation of privacy is reasonable depends in large part

upon whether that expectation relates to information that has been ‗exposed to the

public.‘‖ Maynard, 615 F.3d at 558 (internal alterations omitted) (quoting Katz v.

United States, 389 U.S. 347, 351 (1967)). ―In considering whether something is

‗exposed‘ to the public as that term was used in Katz[,] we ask not what another

person can physically and may lawfully do but rather what a reasonable person

expects another might actually do.‖ Id. at 559.


      A. Appellant had no reasonable expectation of privacy in his location
         while he was on the public roads with the powered-on, stolen cell
         phone.

      It appears that police used the cell-site simulator to locate appellant‘s phone

rather than the stolen phone. However, appellant‘s expectation of privacy with

respect to the location of his phone need not come into play in our resolution of

this case because appellant exposed that location to discovery by being on the

public roads with both his phone and the powered-on, stolen cell phone. Even if

appellant generally had a subjective expectation that information about his cell

phone‘s location would be private, he could not have had a reasonable expectation

that the location of his cell phone would remain private while he was traveling on

the public roads with a powered-on, stolen cell phone.
                                          69


      The sexual assaults and robberies in this case occurred in 2013. Well before

that time, Apple had introduced the Find My iPhone application (―app‖). See In re

J.A., No. A-1624-14T2, 2016 N.J. Super. Unpub. LEXIS 430, *11 n.3 (Super. Ct.

App. Div. Feb. 29, 2016) (noting that ―Apple introduced the Find My iPhone

feature in 2011‖ and that, in that case, the Find My iPhone app ―allowed police to

track J.A. by following the stolen iPhone‘s signal to the Shelbourne Lane address

within minutes of the robbery‖). And indeed in this case, one of the detectives

working on the case, Detective Rachel Pulliam, testified that she had ―one of the

complainant‘s information in [her] phone as well [as] in the Find My iPhone app‖

(and thus was able to ―get a general idea of where‖ she would be going to meet the

TSU officers who had located appellant through use of the cell-site simulator). It

appears that the detective was referring to her ability to use the Find My iPhone

app in an effort to locate the Apple iPhone 4S cell phone stolen from the woman

the police referred to as complainant number one‘s cousin (who was robbed but not

sexually assaulted at the end of the first of the two incidents involved in this case).

As it happened, police in this case tracked the stolen Sprint phone and not that

iPhone, but case law is replete with references to iPhone owners or law

enforcement officers locating stolen iPhones by using the Find My iPhone app in

2013 or earlier years.19 The facts caution against assuming that the Find My

      19
           See, e.g., People v. Easton, No. H041704, 2017 Cal. App. Unpub. LEXIS
                                                                     (continued…)
                                         70


iPhone app or similar find-my-device apps always pinpoint an address or do so



(…continued)
644, *5 (Jan. 30, 2017) (―Using the Find My iPhone application [in 2012], police
recovered Casey‘s cell phone from a recycling bin in front of a residence in Santa
Clara within a few blocks of defendant‘s residence.‖); State v. Copes, No. 84, 2017
Md. LEXIS 478, *5 n.4 (July 28, 2017) (citing a November 2011 publication
entitled ―How to Use Find My iPhone to Get Your Stolen iPhone Back‖); People v.
Foy, 199 Cal. Rptr. 3d 208, 212 (Ct. App. 2016) (―Wang had an application on his
iPhone called ‗Find My iPhone,‘ which he used [in 2011] at the suggestion of
police to track Song‘s stolen iPhone. Wang‘s phone displayed a map indicating
that Song‘s phone was located at 603 Grant Street[.]‖); People v. Robinson, No.
3268/2013, 2016 N.Y. Misc. LEXIS 652, * 3, (App. Div. Feb. 24, 2016) (―As they
were driving [in 2013], the ‗Find My iPhone‘ tracker showed the [stolen] phone to
be moving. The movement stopped at East 120th Street and First Avenue in
Manhattan.‖); People v. Snyder, No. B265391, 2016 Cal. App. Unpub. LEXIS
8230, *2 (Nov. 16, 2016) (―Using another device‘s ‗find my iPhone‘ feature [in
2013], Jordyn tracked her iPhone‘s location to the Mentor Court residence.‖);
People v. Scales, No. B260902, 2016 Cal. App. Unpub. LEXIS 1942, *7-8 (Mar.
17, 2016) (―[A] Los Angeles Police Department . . . Officer . . . used a ‗Find My
iPhone App‘ [in 2012] to locate Schulz‘s cell phone that had been taken during the
robbery events. It was found on the side of the 10 Freeway about two miles away
from the Green Path building.‖); Adams v. State, No. 1142, 2016 Md. App. LEXIS
457, *3 n.3 (Ct. Spec. App. Feb. 5, 2016) (―Because Myers‘ cell phone was inside
his [stolen] vehicle, police [in 2013] were able to locate the car by tracking the
phone by use of the ‗find my iPhone‘ application.‖); Commonwealth v. Gil, No.
566-EDA-2014, 2015 Pa. Super. Unpub. LEXIS 3695, *2 (Feb. 10, 2015) (―After
the victim reported the robbery [in 2012], the police tracked the iPhone, through a
‗Find My iPhone‘ mobile application, to a house on Washington Street.‖); State v.
Coleman, No. W2012-00880-CCA-R3-CD, 2013 Tenn. Crim. App. LEXIS 573, *3
(June 10, 2013) (―Mr. Petty recalled that there was an application on his wife‘s
phone called ‗Find My iPhone.‘ Mr. Petty was able to use his computer to track
the phone‘s location to a general vicinity of Division and Waddell Street.‖); Pirozzi
v. Apple, Inc., 966 F. Supp. 2d 909, 915 (N.D. Cal. 2013) (quoting a statement
from Apple‘s website that ―In the event your iPhone is lost or stolen, Find My
iPhone allows you to locate it on a map[.]‖); United States v. Flores-Lopez, 670
F.3d 803, 808 (7th Cir. 2012) (referring to the Find My iPhone app).
                                          71


accurately,20 or that the only method officers used in the reported cases to locate

the stolen phones was such an app (and not, for example, the app supplemented

with use of a cell-site simulator). But the relevant point is that, in 2013, the public

had reason to know that, because of ―the ubiquity of . . . apps,‖21 it was quite

possible for a stolen cell phone to be tracked with precision, even if such efforts

were not always successful.



      Further, even aside from the apps available to cell phone owners, cellular

service providers have long been able to supply cell phone locational data in close

to real-time,22 and, as at least one court observed in 2010, the providers‘

capabilities were increasing.23 In 2013, it would have been reasonable to expect


      20
          Detective Pulliam testified that the Find My iPhone app showed her
―[not] an exact, pinpointed location‖ but, at one point, ―a general area . . . in
southeast‖ (perhaps the area of the District into which the phones traveled when,
according to other evidence, they left Capitol Heights, Maryland, and headed
toward Kenilworth Avenue).
      21
         Commonwealth v. Wilson, No. 15-P-851, 2016 Mass App. Unpub. LEXIS
466, *3 (Apr. 29, 2016).
      22
          The evidence in this case showed that the police TSU received updated
location information from the cellular service providers at least every fifteen
minutes (every five minutes for the stolen Sprint phone), with only a one-to-three-
minute lag time.
      23
          The following observations made by that court in 2010 are notable:
―Neither the user nor the carrier can predict how precise the next location data will
be. For a typical user, over time, some of that [location] data will likely have
                                                                      (continued…)
                                         72


that the owner of the stolen cell phone might try to locate it by obtaining cell-site

location information from her cellular service provider. Surely ―[t]he availability

and use of [the foregoing] and other new devices . . . shape the average person‘s

expectations about the privacy of‖ cell phone movements and location. Jones, 565

U.S. at 429 (Alito, J., concurring in judgment).24 Further, it was reasonable to

expect that the owner of the stolen cell phone would seek help from the police and

put in motion their efforts, with whatever cell-site location information and devices

were at their disposal, to locate the stolen phone. As police TSU Sergeant Perkins

testified, with the cell phone simulator, ―either one [i.e., the stolen phone or

appellant‘s phone] would have got us to the area [where they found appellant in his




(…continued)
locational precision similar to that of GPS‖; ―Emerging versions of the technology
are even more precise‖; ―[T]he tech-savvy user may now understand that there is a
risk that the provider can calculate and record his location and movements very
precisely.‖ In re Application for United States for Historical Cell Site Data, 747 F.
Supp. 2d 827, 833-34, 845 (S.D. Tex. 2010), rev’d on other grounds, 724 F.3d 600
(5th Cir. 2013).

      24
           Such considerations led the Second Circuit to observe that ―any
expectation of privacy that [the defendant] had in his cell-phone location [tracked
over a less-than-two-hour period] was dubious at best.‖ United States v.
Caraballo, 831 F.3d 95, 105 (2d Cir. 2016). See generally United States v.
Wheeler, 169 F. Supp. 3d 896, 908 (E.D. Wis. 2016) (noting that ―[t]he media is
rife with information — and sometimes warnings — about the fact that one‘s
location can be tracked from one‘s cell phone‖).
                                         73


car].‖25


       By traveling with the stolen cell phone that was susceptible to all the

foregoing find-the-phone methods and devices, appellant exposed his location, too.

I therefore find it impossible to conclude that appellant could reasonably have

expected that his movements and location with the stolen phone in his possession

would be private (and thus that he had an ―expectation of privacy in his phone‘s

location‖). Moreover, if appellant had such an expectation, I suspect that it is not

one that society is prepared — and in my view it is not one that we should be

prepared26 — to recognize as reasonable. To be sure, our cell phones play such a

central role in our lives and contain so much of our personal data that we must be

vigilant about protecting against government intrusions into cell phone privacy.

But the other side of that coin is that — I strongly suspect — a great many people

who have had a cell phone stolen or who fear such a theft are likely to have a

       25
         Appellant suggests that the evidence indicated that the cell-site simulator
did not work with the stolen cell phone, but the trial court declined to so find. The
court found instead that if the TSU officers ―had . . . switched over . . . to use the
Sprint number instead, . . . they would have eventually gotten to the exact same
place because the phones were together.‖
       26
          I have in mind the caution that where we may have been ―‗conditioned‘
by influences alien to the well-recognized Fourth Amendment freedoms, a
normative inquiry may be necessary to align‖ what we are prepared to recognize as
legitimate privacy interests ―with the protections guaranteed in the Fourth
Amendment.‖ Tracey v. State, 152 So. 3d 504, 525–26 (Fla. 2014).
                                          74


strong desire to recover their stolen phones and to be unwilling to recognize as

legitimate the locational-privacy interest of a person who is traveling the streets

with a stolen phone.27 I am not the first to observe that ―many people may find the

tradeoff [between electronic tracking technology and some diminution of privacy]

as worthwhile.‖ Jones, 565 U.S. at 427 (Alito, J., concurring in judgment).




      To be clear, the analysis above does not rely on the inevitable-discovery
      27
           My conclusion that appellant was traveling with a stolen phone as to
which he had no locational-privacy interest does not depend on the jury verdict that
he was the thief, i.e., the perpetrator of the robberies. Cf. Godfrey v. United States,
414 A.2d 214, 214 (D.C. 1980) (―The real question is whether the [proponent of a
motion to suppress] can be deemed to have a legitimate expectation of privacy in
the thing or area searched and the item seized without reference to‖ an
―unfortunate pretrial connotation that the proponent of the motion to suppress is
guilty.‖) Rather it rests on the evidence presented at the suppression hearing that,
when arrested, appellant had with him in his car all four stolen phones as well as
the phone used by the perpetrator of the robberies and sexual assaults. (Unlike the
defendant in McFerguson v. United States, 770 A.2d 66 (D.C. 2001) — a case
Judge Farrell suggests is apposite, ante at 53 n.2 — appellant was not ―a street
pedestrian [with] a reasonable expectation of privacy in covered objects associated
with his person,‖ id. at 71). I believe we can say with confidence that even if
appellant had disputed at the suppression hearing that he knew that the victims‘
(four) phones found in his possession had been stolen and had attempted to show
that he had a legitimate possessory interest in and expectation of privacy with
respect to the stolen Sprint phone, he would not have been able to carry his burden
of so demonstrating. See Rakas v. Illinois, 439 U.S. 128, 130 n.1 (1978) (―The
proponent of a motion to suppress has the burden of establishing that his own
Fourth Amendment rights were violated by the challenged search or seizure.‖);
Morton v. United States, 734 A.2d 178, 182 (D.C. 1999) (referring to defendant‘s
―burden of showing that he had a protectible interest‖).
                                        75


doctrine to conclude that use of the cell-site simulator was lawful. As the majority

opinion notes, the inevitable-discovery doctrine ―shields illegally obtained

evidence from the exclusionary rule if the government can show, by a

preponderance of the evidence, that the evidence ‗ultimately or inevitably would

have been discovered by lawful means.‘‖ Gore v. United States, 145 A.3d 540,

548 (D.C. 2016) (quoting Hicks v. United States, 730 A.2d 657, 659 (D.C. 1999)).

The inevitable-discovery doctrine thus requires proof that a presumably lawful

search process was actually underway; here, at least arguably, that would have

entailed at a minimum having entered the pertinent number of the stolen cell phone

(which police had obtained) into the cell-site simulator. There was some evidence

that the TSU officers did that, but, in the trial court‘s view, not enough such

evidence to enable the government to prove by a preponderance of the evidence

that the officers used the cell-site simulator to find the stolen phone rather than

appellant‘s phone.    However, for purposes of my analysis focused on what

appellant could reasonably have expected others to do, I have properly relied on

what the police could have done with respect to the stolen cell phone (or, it

appears, with respect to the cousin‘s stolen iPhone) that would have enabled them

to locate appellant and his phone.



      United States v. Gbemisola, 225 F.3d 753 (D.C. Cir. 2000), illustrates the
                                         76


point. There, law enforcement agents had installed and subsequently monitored an

electronic tracking device in a package addressed to the defendant, which enabled

the agents to know if and when the defendant opened the package — which he did

while riding in the back of a taxicab. Id. at 756. Noting that the agents did not see

when the box was opened, the D.C. Circuit concluded that no warrant was required

for their use of the electronic device that reported when the box was opened

because the ―decisive issue . . . [was] not what the officers saw but what they could

have seen.‖ Id. at 759 (emphasis added). ―At any time, the surveillance vehicle

could have pulled alongside of the taxi and the officers could have watched

Gbemisola through its window. Indeed, the taxi driver himself could have seen the

event simply by looking in his rear-view mirror or turning around.‖ Id.; see also

Maynard, 615 F.3d at 560 (―[I]t was not at all unlikely Gbemisola would be

observed opening a package while seated in the rear of a taxi[.]‖). Thus, the fact

that the agents learned what they learned through an electronic device (one

presumably not generally available to members of the public) was not the

important factor; the important factor was that they, or someone else, could have

learned that the defendant opened the package through lawful means.28




      28
          It might be suggested that the analysis in Gbemisola is a straightforward
application of the Supreme Court‘s ruling in United States v. Knotts, 460 U.S. 276
                                                                      (continued…)
                                         77




      The same point applies here.        Again, police TSU Sergeant Perkins‘s

testimony (and the trial court‘s finding) was that, with the cell-cite simulator,

―either [phone] would have got[ten them] to [where they found appellant in his

car].‖ In other words, officers could have found appellant‘s location through use

of the cell-site simulator targeted at the stolen cell phone that was in his vehicle

(the lawfulness of which approach appellant does not challenge, and likely has no

(…continued)
(1983), about the lawfulness of use of a monitoring device that reveals no more
than could be seen by visual surveillance. See id. at 282–84 (holding that the
officers‘ conduct in monitoring signals from a beeper they had installed in a
container the defendant subsequently placed in his car did not invade any
legitimate expectation of privacy and did not constitute a Fourth Amendment
search since the beeper surveillance revealed no more than could have been visible
to the naked eye as the car traveled the public highway and raised no constitutional
issues that visual surveillance would not also raise); see also United States v. Karo,
468 U.S. 705, 714 (1984) (―[T]he monitoring of a beeper in a private residence, a
location not open to visual surveillance, violates the Fourth Amendment rights of
those who have a justifiable interest in the privacy of the residence.‖) (emphasis
added). However, the Supreme Court‘s decision in Bond v. United States, 529
U.S. 334 (2000), makes clear that what an individual exposes to the public is not
limited to what can be learned through visual perception (outside a residence), but
also includes what members of the public may be able to discern through
predictable tactile actions. See id. at 338 (―When a bus passenger places a bag in
an overhead bin, he expects that other passengers or bus employees may move it
for one reason or another. Thus, a bus passenger clearly expects that his bag may
be handled‖ and ―exposed to certain kinds of touching and handling.‖). I see no
reason why the analysis of whether something is exposed to the public based on
―what a reasonable person expects another might actually do,‖ Maynard, 615 F.3d
at 559, should not include as well the find-my-stolen-phone efforts likely to be set
in motion by an individual whose cell phone has been stolen.
                                         78


standing to challenge).29 The fact that (we presume) police officers actually found

appellant‘s location by using the cell-site simulator on appellant‘s cell phone

should not change the Fourth Amendment calculus.



      B. The (assumed) fact that the police actually used the cell-site
         simulator as to appellant’s cell phone while it was on the public roads
         does not provide a basis for finding a Fourth Amendment violation.

      My colleagues focus, however, on the apparent fact that the police entered

the identifying number for appellant‘s cell phone into the cell-site simulator and

thus used it to locate appellant‘s phone rather than the co-located stolen phone.

They emphasize that ―when it comes to the Fourth Amendment, means . . . matter.‖

Ante, at 18 (quoting Maynard, 615 F.3d at 566). But, as the D.C. Circuit explained

in Maynard, what matters with respect to the means employed is whether ―one‘s

reasonable expectation of control over one‘s personal information would . . . be

defeated‖ through that means of information gathering. 615 F.3d at 566. For the

reasons already discussed, on the facts of this case, appellant had no reasonable

expectation of control over the information about his location while he was on the

      29
          See Lucas v. United States, 411 A.2d 360, 363 (D.C. 1980) (―[I]t is not so
clear that persons can always assume that the right to privacy extends to articles of
contraband in their possession.‖); United States v. White, 504 F. App‘x 168, 172
(3d Cir. 2012) (citing authority from several federal circuits that one who
knowingly possesses a stolen item has no legitimate expectation of privacy with
respect to it and no standing to challenge a search of it).
                                        79


public roads with the powered-on, stolen cell phone in his possession.


      Moreover, while the ―means . . . matter‖ principle applies a fortiori when it

comes to law enforcement efforts to learn about what is contained or is transpiring

in a home,30 the principle applies with much less consistency when what is

challenged as a ―search‖ took place on public roads. See Knotts, 460 U.S. at 282

(explaining that the defendants had no legitimate expectation of privacy that was

violated by use of a beeper, pre-installed inside a container of chemicals that the

defendant purchased and put in his car, which sent signals to a police receiver and

enabled police to track the movements of the car, because police could have

tracked the car‘s movements by driving behind it); United States v. Patrick, 842

F.3d 540, 545 (7th Cir. 2016) (concluding that because the defendant, located with

use of a cell-site simulator, was at the time ―in a public place, where he had no

legitimate expectation of privacy, [he could]not complain about how the police

      30
          See, e.g., Kyllo, 533 U.S. at 35 n.2 (analyzing whether use of a thermal-
imaging device, capable of detecting the amount of heat emanating from a home,
constituted an unlawful search when, without a warrant, it was aimed at the home
of an individual suspected of growing marijuana in his home using high-intensity
lamps; reasoning that the ―comparison of the thermal imaging to various
circumstances in which outside observers might be able to perceive, without
technology, the heat of the home — for example, by observing snowmelt on the
roof — is quite irrelevant. The fact that equivalent information could sometimes
be obtained by other means does not make lawful the use of means that violate the
Fourth Amendment‖ (internal citation omitted)).
                                          80


learned his location.‖); see also Gbemisola, 225 F.3d at 759.


      My colleagues ultimately acknowledge that ―certain forms of tracking [in

public spaces] . . . do not invade a reasonable expectation of privacy.‖ Ante at 18.

What they seem to regard as dispositive is that by using the cell-site simulator, the

police ―actively induce[d] the phone to divulge its identifying information.‖ Ante

at 17. Judge Farrell sees as the critical fact that with the cell-site simulator, the

police TSU officers ―commandeer[ed]‖ appellant‘s cell phone, turning it into a

―self-investigative‖ tool. I have several responses.



      First, for a couple of reasons, I believe the foregoing characterizations

somewhat overstate the facts.      As one court has noted, ―cell phones identify

themselves by an automatic process called ‗registration,‘ which occurs

continuously while the cell phone is turned on regardless of whether a call is being

placed.‖ Tracey, 152 So. 3d at 507 n.1.31 That observation accords with the


      31
             See also Copes, 2017 Md. LEXIS 478, at *6 (―A cell site
simulator . . . takes advantage of the fact that a cell phone — when turned on —
constantly seeks out nearby cell towers, even if the user is not making a call
. . . When the cell site simulator is close enough, the target phone will connect to it
as though it were a cell tower.‖); In re Application for Tel. Info. Needed for a
Criminal Investigation, 119 F. Supp. 3d 1011, 1014 (N.D. Cal. 2015) (―[C]ell
phones, when turned on and not in airplane mode, are always scanning their
network‘s cellular environment. In so doing, cell phones periodically identify
themselves to the closest cell tower — i.e., the one with the strongest radio signal
                                                                        (continued…)
                                         81


testimony by defense telecommunications technology expert Ben Levitan in this

case. See Levitan Aff. 5 (―When a phone attaches itself to a cell tower, it identifies

itself by phone number and various codes.‖).           In other words, identifying

themselves constantly is what powered-on cell phones do, regardless of whether a

cell-site simulator is in the area. Second, while the majority opinion accurately

quotes TSU Sergeant Perkins‘s testimony that the cell-site simulator ―grabs [the

target cell phone] and holds on to it for a minute,‖ the opinion does not recount

Sergeant Perkins‘s additional explanation. Sergeant Perkins explained that ―by

grabs it,‖ he meant that the cell site simulator ―just knows it‘s there,‖ much as one

knows when he has arrived at a station he is looking for by scanning the radio dial.

Mr. Levitan put it differently, explaining that cell phones ―generally connect

themselves to the strongest cell tower signal that they detect,‖ and, in that vein,

when a cell phone detects the cell-site simulator as having the strongest signal, it

will ―break its connection with the cell phone network and reattach itself to the

newly found . . . simulator.‖ The Department of Justice document entitled ―Dep‘t

of Justice Policy Guidance: Use of Cell-Site Simulator Technology (Sept. 3,



(…continued)
— as they move throughout their network‘s coverage area. This process[ is]
known as ‗registration‘ or ‗pinging[.]‘ . . . Pinging is automatic and occurs
whenever the phone is on, without the user‘s input or control.‖ (record citations
omitted)).
                                           82


2015),     http://www.justice.gov/opa/file/767321/download        (the   ―DOJ     Policy

Guidance‖), states similarly that ―cellular devices in the proximity of the [cell-site

simulator] identify the simulator as the most attractive cell tower in the area and

thus transmit signals to the simulator that identify the device in the same way that

they would with a networked tower.‖ Id. at 2. Thus — if it matters — it appears

that it is cell phones that initiate contact with a cell-site simulator and not the other

way around.32


      In any event, my colleagues raise points that must be addressed when they

emphasize that by using the cell-site simulator, the TSU officers took ―functional

control‖ of and ―coopted [appellant‘s] phone, forcing it to do something [he] surely

never intended it to do: reveal its identifying and location information to an entity


      32
           But see Andrews, 134 A.3d at 340 (citing testimony in that case that a
cell-site simulator known as the Hailstorm ―is an active device that can send an
electronic signal . . . and ‗draw[] the phone to [the] equipment‖‘ (alteration in
original)).
       My colleagues also say that the cell-site simulator ―exploits a security
vulnerability‖ of cell phones. Ante at 17. I would not call what happened here as
exploitation of a cell phone security flaw, but as law enforcement‘s taking
advantage of a security-enhancement feature that aids in the recovery of stolen or
lost phones. It may place a person who is traveling on the roads with a powered-
on, stolen cell phone (that circumstances show he knew to be stolen) in the position
either of accepting the risk that at any moment the stolen cell phone or his own cell
phone could be converted into a tracking device or, alternatively, turning the
phones off, but I do not see why that is an improper choice to foist on the person.
                                         83


other than a telecommunications provider.‖ Ante, at 24 n.27. Judge Farrell finds it

―unpersuasive‖ ―to argue that appellant had no reasonable expectation of privacy in

the police‘ use of his phone‖ for this purpose. Ante, at 47. One major problem for

my colleagues‘ analysis, however, is that, as shocking or outrageous as the

foregoing characterizations might sound, the officer‘s use of the cell-site simulator

did not constitute a ―search‖ and thus was not a Fourth Amendment violation

unless appellant had a reasonable and legitimate expectation of privacy with

respect to the object of the challenged search: his location information. For the

reasons already discussed, he did not while he was on the public roads with a

trackable, stolen cell phone.



      It is helpful to recall the facts of California v. Greenwood, 486 U.S. 35

(1988). In Greenwood, a police detective asked the regular trash collector in

Greenwood‘s neighborhood to pick up the plastic garbage bags that Greenwood

had left on the curb in front of his house and to turn the bags over to the detective

without mixing their contents with garbage from other houses. Id. at 37. The trash

collector responded by cleaning his truck bin of other garbage, collecting the

garbage bags from the street in front of Greenwood‘s house, and turning the bags

over to the detective. Id. The detective searched through the trash and found items

indicative of narcotics use. Id. at 37–38. The Greenwood respondents asserted
                                         84


―that they had, and exhibited, an expectation of privacy with respect to the trash

that was searched by the police,‖ emphasizing that the trash had been placed on the

street for collection at a fixed time and was contained in opaque bags, which the

garbage collector was expected to pick up, mingle with the garbage of others, and

deposit at the garbage dump. Id. at 39. The respondents also highlighted that

―there was little likelihood that [the trash] would be inspected by anyone.‖ Id. The

Supreme Court acknowledged that ―[i]t may well be that respondents did not

expect that the contents of their garbage bags would become known to the police

or other members of the public,‖ id. at 39, but reasoned nevertheless that the police

conduct did not constitute a Fourth Amendment violation (because respondents

―could have had no reasonable expectation of privacy in the inculpatory items that

they discarded‖). Id. at 41.



      In my view, the intrusive police conduct in Greenwood, by which police

officers converted the entire contents of respondent‘s trash into a database of

information about his activities, was every bit as objectionable as the temporary

―coopt[ing]‖ of appellant‘s cell phone. I suspect most of us would be outraged at

the effrontery of law enforcement officials in systematically inspecting our trash.

But that would not be enough to establish that police officers‘ systematic
                                         85


rummaging through our trash is a ―search‖ for Fourth Amendment purposes.33

And any sense of outrage here is likewise not enough to establish that use of the

cell-site simulator in the particular circumstances of this case violated appellant‘s

Fourth Amendment rights.34


      But even if we assume that the TSU officers‘ taking ―functional control‖ of

and ―coopt[ing] [appellant‘s] phone‖ was a search and/or seizure for Fourth

Amendment purposes, there is yet another consideration that, in my view, should

preclude the court from concluding that the search/seizure was unlawful.35 The


      33
          Cf. Historical Cell Site Data, 724 F.3d at 615 (―We understand that cell
phone users may reasonably want their location information to remain private, just
as they may want their trash, placed curbside in opaque bags, . . . to remain so. But
the recourse for these desires is in the market or the political process . . . . The
Fourth Amendment, safeguarded by the courts, protects only reasonable
expectations of privacy.‖ (internal citation omitted)).
      34
          Another lesson from Greenwood is the principle on which Gbemisola,
was decided: that if the individual does not have a reasonable expectation of
privacy in the object of an activity that we would describe in ordinary parlance as a
search, there is no search for Fourth Amendment purposes even if the manner in
which law enforcement conducted their garbage inspection was not available to
most members of the public. The Supreme Court observed in Greenwood that the
respondents‘ trash was readily accessible to ―animals, children, scavengers,
snoops, and other members of the public.‖ 486 U.S. at 40. But it is likely that few
people other than the police would have been granted the accommodation of
having the trash collector segregate all of the respondents‘ garbage from other
garbage.
      35
           ―A ‗seizure‘ of property occurs when ‗there is some meaningful
interference with an individual‘s possessory interests in that property.‘‖ Karo, 468
                                                                       (continued…)
                                         86


police TSU officers could reasonably infer that the stolen cell phone and

appellant‘s phone were traveling together in a car or other vehicle because the real-

time location information showed them as having gone from Capitol Heights,

Maryland, to Kenilworth Avenue, before moving to the 4000 block of Minnesota

Avenue, N.E.     The automobile exception to the Fourth Amendment warrant

requirement ―permits the warrantless search of a car [or other vehicle] that is

‗readily mobile‘ so long as ‗probable cause exists to believe it contains

contraband.‘‖   United States v. Eshetu, 863 F.3d 946, 951 (D.C. Cir. 2017)

(quoting Pennsylvania v. Labron, 518 U.S. 938, 940 (1996) (per curiam)); United

States v. Shackleford, 830 F.3d 751, 753 n.2 (8th Cir. 2016) (―The automobile

exception requires probable cause to believe contraband or evidence of any crime

will be found in the vehicle[.]‖).36 And, ―[i]f probable cause justifies the search of



(…continued)
U.S. at 712 (quoting United States v. Jacobsen, 466 U.S. 109, 113 (1984)). There
was at least arguably a seizure here, because, according to the testimony, use of the
cell-site simulator may have caused calls appellant tried to make from his phone to
drop. (I note that to the extent that the presence of the cell-site simulator in the
area caused dropped calls or other disruption of the cell phones of other people in
the area, appellant has no standing to complain.)

      36
         See also California v. Carney, 471 U.S. 386, 393 n.2 (1985) (―With few
exceptions, the courts have not hesitated to apply the vehicle exception to vehicles
other than automobiles.‖); id. at 392-93 (explaining that if a vehicle ―is readily
capable of such use [on the highways] and is found stationary in a place not
regularly used for residential purposes,‖ the ―justifications for the vehicle
                                                                      (continued…)
                                          87


a lawfully stopped vehicle, it justifies the search of every part of the vehicle and its

contents that may conceal the object of the search.‖ United States v. Ross, 456

U.S. 798, 825 (1982); Eshetu, 863 F.3d at 952.


      ―Probable cause exists when based on the known facts and circumstances, a

reasonably prudent person would believe that contraband or evidence of a crime

will be found in the place to be searched.‖ United States v. Charles, 801 F.3d 855,

860 (7th Cir. 2015) (internal quotation marks omitted). Here, even before using

the cell-site simulator, the police TSU officers had near real-time cell-site location

information that gave them probable cause to believe that a vehicle was on the

public roads with both the stolen cell phone and the cell phone used by the sexual

assault/robbery perpetrator, and thus probable cause to believe that—whatever the

subject vehicle‘s precise location on the roads37—it contained contraband and


(…continued)
exception come into play,‖ because ―the vehicle is obviously readily mobile by the
turn of an ignition key, if not actually moving‖); id. at 392 (―[I]ndividuals always
have been on notice that movable vessels may be stopped and searched on facts
giving rise to probable cause that the vehicle contains contraband, without the
protection afforded by a magistrate‘s prior evaluation of those facts.‖ (internal
quotation marks and alterations omitted)). And, there is exigency about searching
a vehicle where there is probable cause to believe it contains contraband: ―[T]he
overriding societal interests in effective law enforcement justify an immediate
search before the vehicle and its occupants become unavailable.‖ Id. at 393.
      37
         Cf. State v. Tate, 849 N.W.2d 798, 810 (Wis. 2014) (reasoning that even
if a warrant had been required to authorize use of a cell-site simulator, the exact
                                                                     (continued…)
                                         88


evidence of a crime. This means that — under the automobile exception — the

vehicle was searchable without a warrant, and that any cell phones in it that might

have been contraband or evidence of the crime could be seized.38 We should

therefore hold that when the cell-site simulator simultaneously detected/caught the

signal from appellant‘s cell phone (which was located in a car parked on the street)

and ―seized‖ the phone by ―hold[ing] on to it for a minute,‖ there was no Fourth

Amendment violation. Any locational information obtained from the cell phone

was not content that could be searched only pursuant to a warrant.39


(…continued)
place to be searched, such as a street address, was not required).
      38
          Our request for supplemental briefing signaled, without explicitly
suggesting, that the automobile exception might be implicated on the facts of this
case (and amici briefly addressed its applicability in their initial brief).
      39
           See Graham, 824 F.3d at 434 (rejecting the argument that cell-site
location information should be treated as ―content‖ for Fourth Amendment
purposes).
       Again, this case does not involve a warrantless search of any digital content
(such as text messages, emails, contact lists, call logs, voicemail messages,
photographs, videos, files, internet browsing history, apps that are revelatory of a
person‘s interests, historic location information, etc.) stored on appellant‘s cell
phone, the conduct for which, the Supreme Court determined in Riley v.
California, 134 S. Ct. 2473, 2485 (2014), a warrant was needed. See id. at 2480-
81 (involving a search of the cell phone that was found in Riley‘s pocket after he
was stopped for driving with expired tags and subsequently arrested for possession
of concealed and loaded firearms); see also DOJ Policy Guidance at 2 (―[T]he
[cell-site] simulator does not remotely capture emails, texts, contact list, images or
any other data from the phone.‖). The seizure, ―interfer[ence] with the
functioning‖ of, or ―coopt[ing]‖ of appellant‘s phone involved here, including the
                                                                       (continued…)
                                          89


                                         ***


      I end by repeating and underscoring that my dissent rests on the particular

facts of this case:    Police had near real-time information, from cell phone

providers, that the cell phone the robbery/sexual assault assailant had used to lure

his victims was traveling on the public streets together with a trackable, powered-

on cell phone stolen from one of the assailant‘s victims (who gave the police

permission to obtain her phone records); they could infer that the phones were

traveling together in a car or other vehicle; and law enforcement officers‘ use of a

cell-site simulator in the vicinity led them to a ―handful of cars‖ parked at the

Minnesota Avenue Metro station and to a car in which appellant sat with the stolen

cell phone in his possession.      To hold that the officers‘ use of the cell-site

simulator in this case was lawful would come nowhere close to holding, as my

colleagues conclude, that police may use cell-site simulators ―at will‖ to locate any

individual who is carrying a cell phone, without regard to whether the individual is

known to be in a vehicle moving through the public streets and without regard to

(…continued)
effect of having his calls dropped, is akin to the interruptions or intrusions that the
Riley Court found permissible when police officers execute a search incident to
arrest that turns up a cell phone: they are ―free to examine the physical aspects of
[the] phone,‖ may ―turn the phone off or remove its battery,‖ or may ―leave a
phone powered on and place it in an enclosure that isolates the phone from radio
waves.‖ 134 S. Ct. at 2485, 2487.
                                         90


whether the individual is known to have with him in the vehicle both a trackable

cell phone stolen during a set of robberies and the cell phone from which an

assailant placed calls to lure his sexual assault/robbery victims. Quite the contrary,

the holding I believe is the right one would, because of its nuanced analysis, sound

a cautionary note about using a cell-site simulator in other circumstances without a

warrant.40



      What we should not do in resolving this appeal is to jump on the bandwagon

of decrying what is claimed to be a Fourth Amendment violation from use of cell-

site-simulator technology without recognizing how the particular, material facts of

this case distinguish it from the cell-site simulator cases courts have decided before

this one. The Supreme Court has recognized the need for ―consideration of case-




      40
            In addition, even if I assume arguendo that there was a Fourth
Amendment violation, I am doubtful that suppression in this case would ―pay its
way,‖ United States v. Leon, 468 U.S. 897, 907 n.6 (1984), under the ―cost-benefit
analysis in exclusion cases,‖ Davis v. United States, 564 U.S. 229, 238 (2011),
particularly in light of the Department of Justice‘s announced general policy that
the government now must seek warrants for cell-site simulator use. DOJ Policy
Guidance at 3-4. ―[T]he [exclusionary] rule‘s operation [is limited] to situations in
which th[e] purpose [of deterrence] is thought most efficaciously served‖;
accordingly, ―[w]here suppression fails to yield appreciable deterrence, exclusion
is clearly unwarranted.‖ Davis, 564 U.S. at 237 (internal alterations and quotation
marks omitted).
                                            91


specific exceptions to the warrant requirement‖;41 we are remiss if we do not

carefully consider the distinguishing facts of this case; and the public deserves no

less from us, even as we do what we must to protect precious Fourth Amendment

rights.


          For all the foregoing reasons, I respectfully dissent from the judgment

reversing appellant‘s convictions of two counts of first-degree sexual abuse while

armed, two counts of kidnapping while armed, four counts of robbery while armed,

and one count of threats.




          41
               Riley, 134 S. Ct. at 2486.
