REPORTED IN THE COURT OF SPECIAL APPEALS OF MARYLAND No. 1496 September Term, 2015 ______________________________________ STATE OF MARYLAND v. KERRON ANDREWS ______________________________________ Leahy, Friedman, Thieme, Raymond G., Jr. (Retired, Specially Assigned) JJ. ______________________________________ Opinion by Leahy, J. ______________________________________ Filed: March 30, 2016 “[M]odern cell phones . . . are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.” Riley v. California, 134 S. Ct. 2473, 2484 (2014). This case presents a Fourth Amendment issue of first impression in this State: whether a cell phone—a piece of technology so ubiquitous as to be on the person of practically every citizen—may be transformed into a real-time tracking device by the government without a warrant. On the evening of May 5, 2014, the Baltimore City Police Department (BPD) used an active cell site simulator, without a warrant, to locate Appellee Kerron Andrews who was wanted on charges of attempted murder. The cell site simulator, known under the brand name “Hailstorm,” forced Andrews’s cell phone into transmitting signals that allowed the police to track it to a precise location inside a residence located at 5032 Clifton Avenue in Baltimore City. The officers found Andrews sitting on the couch in the living room and arrested him pursuant to a valid arrest warrant. The cell phone was in his pants pocket. After obtaining a warrant to search the residence, the police found a gun in the cushions of the couch. In the Circuit Court for Baltimore City, Andrews successfully argued that the warrantless use of the Hailstorm device was an unreasonable search under the Fourth Amendment of the United States Constitution. The court suppressed all evidence obtained by the police from the residence as fruit of the poisonous tree. The State, pursuant to Maryland Code (1973, 2013 Repl. Vol., 2015 Supp.), Courts and Judicial Proceedings Article (“CJP”), § 12-302(c)(4), now appeals the court’s decision to suppress that evidence. The specific questions before us, as framed by the State, are: 1) Did the motions court err in finding that the use of a cellular tracking device to locate Andrews’s phone violated the Fourth Amendment? 2) Did the motions court err in finding that Andrews did not have to show standing before challenging the search of the home where he was arrested? 3) Did the motions court err in finding that the search warrant for the home where Andrews was located was invalid? 4) Did the motions court err in excluding the items recovered in this case? We conclude that people have a reasonable expectation that their cell phones will not be used as real-time tracking devices by law enforcement, and—recognizing that the Fourth Amendment protects people and not simply areas—that people have an objectively reasonable expectation of privacy in real-time cell phone location information. Thus, we hold that the use of a cell site simulator requires a valid search warrant, or an order satisfying the constitutional requisites of a warrant, unless an established exception to the warrant requirement applies. We hold that BPD’s use of Hailstorm was not supported by a warrant or an order requiring a showing of probable cause and reasonable limitations on the scope and manner of the search. Once the constitutionally tainted information, obtained through the use of Hailstorm, was excised from the subsequently issued search warrant for 5032 Clifton Avenue, what remained was insufficient to establish probable cause for a search of that residence. Because the antecedent Fourth Amendment violation by police provided the only information relied upon to establish probable cause in their warrant application, those 2 same officers cannot find shelter in the good faith exception, and the evidence seized in that search withers as fruit of the poisoned tree. We affirm. BACKGROUND Andrews was positively identified via photographic array as the person who shot three people on April 27, 2014, as they were attempting to purchase drugs on the 4900 block of Stafford Street in Baltimore City.1 He was charged with attempted first-degree murder and attendant offenses in connection with the shooting, and a warrant for his arrest was issued on May 2, 2014. Pen Register and Trap & Trace Order Unable to locate Andrews, Detective Michael Spinnato of the BPD confirmed Andrews’s cell phone number through a confidential informant, and then submitted an application in the Circuit Court for Baltimore City for a pen register/trap & trace order for Andrews’s cell phone.2 1 Specifically, Det. Spinnato requested authorization for the The State later admitted that there were also two negative photo arrays. As discussed further infra, pursuant to the Maryland Pen Register, Trap and Trace Statute, found at CJP § 10-4B-01 et seq. (“Maryland pen register statute”), a court having jurisdiction over the crime being investigated may authorize the use of a “pen register” and/or a “trap and trace device,” defined as: 2 ‘Pen register’ means a device or process that records and decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted. CJP § 10-4B-01(c)(1). The statute continues, stating: ‘Trap and trace device’ means a device or process that captures the incoming electronic or other impulses that identify the originating number or other 3 “installation and use of device known as a “Pen Register\Trap & Trace and Cellular Tracking Device to include cell site information, call detail, without geographical limits, which registers telephone numbers dialed or pulsed from or to the telephone(s) having the number(s) . . . .” The application stated that Andrews was aware of the arrest warrant, and that to hide from police suspects will contact family, girlfriends, and other acquaintances to assist in their day to day covert affairs. Detective Spinnato would like to track/monitor Mr. Andrews’[s] cell phone activity to further the investigation an [sic] assist in Mr. Andrews’[s] apprehension. *** Your Applicant hereby certifies that the information likely to be obtained concerning the aforesaid individual’s location will be obtained by learning the numbers, locations and subscribers of the telephone number(s) being dialed or pulsed from or to the aforesaid telephone and that such information is relevant to the ongoing criminal investigation being conducted by the Agency. On May 5, 2014, Det. Spinnato’s application was approved in a signed order stating, in part: [T]he Court finds that probable cause exists and that the applicant has certified that the information likely to be obtained by the use of the above listed device(s) is relevant to an ongoing criminal investigation, To wit: Attempted Murder. *** (Emphasis in original). And, as requested in the application, the court, dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication. CJP § 10-4B-01(d)(1). Under Maryland law, an order for a pen register/trap & trace is issued without a warrant and on something less than probable cause. 4 ORDERED, pursuant to Section 10-4B-04 of the Courts and Judicial Proceedings Article . . . [Applicants] are authorized to use for a period of sixty (60) days from the date of installation, a Pen Register \ Trap & Trace and Cellular Tracking Device to include cell site information, call detail, without geographical limits . . . *** ORDERED, . . . [t]he Agencies are authorized to employ surreptitious or duplication of facilities, technical devices or equipment to accomplish the installation and use of a Pen Register \ Trap & Trace and Cellular Tracking Device, unobtrusively and with a minimum of interference to the service of subscriber(s) of the aforesaid telephone, and shall initiate a signal to determine the location of the subject’s mobile device . . . . (Emphasis added). Cell Phone in a Hailstorm As soon as Det. Spinnato obtained the pen register\trap & trace order on May 5, he sent a copy to the BPD’s Advanced Technical Team (the “ATT”). The ATT then issued a form request to the service provider (Sprint) for the following: subscriber information; historical cell site location information (“CSLI”) for the period from April 5 to May 5, 2014; pen register data for 60 days; and precision GPS data from Andrews’s phone. 3 An additional request followed for “GPS Precise Locations and email.” 3 Two broad categories of CSLI may be sought from the service provider. The first is historical CSLI, which is used to look back through service provider records to determine a suspect’s location at a given point in the past. See, e.g., United States v. Graham, 796 F.3d 332, 343 (4th Cir. 2015) (“Historical CSLI identifies cell sites, or ‘base stations,’ to and from which a cell phone has sent or received radio signals, and the particular points in time at which these transmissions occurred, over a given timeframe. . . . The cell sites listed can be used to interpolate the path the cell phone, and the person carrying the phone, travelled during a given time period.”), reh’g en banc granted, 624 F. App’x 75 (4th Cir. 2015). Law enforcement frequently uses historical CSLI to prove that a defendant was in the area where a crime of which he is accused occurred. The second category of CSLI is real-time data, used to track the whereabouts and movements of a suspect by using the cell 5 Later on the same day—May 5—Det. Spinnato began receiving emails from ATT with GPS coordinates for Andrews’s cell phone (within a range of a 200 to 1600 meter radius). Det. Spinnato and officers from the Warrant Apprehension Task Force (“WATF”) proceeded to the general area and waited until they received information from ATT that the cell phone was in the area of 5000 Clifton Avenue, Baltimore City. They proceeded to an area where there were approximately 30 to 35 apartments around a U-shaped sidewalk. Detective John Haley from ATT arrived and, using a cell site simulator known by the brand name “Hailstorm,” was able to pinpoint the location of the cell phone as being inside the residence at 5032 Clifton Avenue.4 Det. Spinnato knocked on the door and, after obtaining the consent of the woman who answered, entered the residence along with several other officers. They found Andrews seated on the couch in the living room with the cell phone in his pants pocket. phone as a tracking device. See, e.g., Tracey v. State, 152 So. 3d 504, 507 (Fla. 2014), reh’g denied (Dec. 8, 2014). Here, the BPD obtained real-time location information from the service provider when it received the GPS coordinates associated with the cell phone from Sprint. Andrews’s motion to suppress, however, was focused primarily on the BPD’s ensuing use of a cell site simulator to directly obtain pin-point location data. Therefore, on appeal we do not address whether the real-time location information from Sprint should have been obtained under a warrant or special order. 4 True to its brand name, the Hailstorm device generates an electronic barrage that impacts all the mobile devices within its range. As noted in the amicus brief filed by the American Civil Liberties Union (“ACLU”) and Electronic Frontier Foundation (“EFF”) at page 3, the fact that cell site simulators actively locate phones by forcing them to repeatedly transmit their unique identifying electronic serial numbers, and then calculating the signal strength until the target phone is pinpointed, is found in several recent federal publications and cases, including a Department of Justice Policy Guidance: Use of CellSite Simulator Technology 2 (Sept. 3, 2015), available at https://www.justice.gov/opa/file/767321/download [https://perma.cc/K99L-H643]. 6 Det. Spinnato arrested Andrews and secured the location until a search warrant could be obtained. Once they had the warrant, the BPD searched the home and found a gun in the couch cushions. Initial Hearings Andrews was indicted by a grand jury on May 29, 2014, on numerous charges related to the April 27, 2014 shooting. On July 1, 2014, the Assistant Public Defender representing Andrews filed an “omnibus” motion including requests for discovery and the production of documents. The State responded with an initial disclosure and supplemental disclosure on July 9 and 11, respectively. Those disclosures, however, failed to reveal the method used to locate Andrews on the date of his arrest. On November 3, 2014, defense counsel filed a supplemental discovery request seeking, inter alia, “[a]ll evidence indicating how Andrews was located at 5032 Clifton Avenue.” The State’s response to that request, dated January 8, 2015, stated, “[a]t this time the State does not possess information related to the method used to locate [Andrews] at 5032 Clifton Avenue.” However, five months later defense counsel received an email from the Assistant State’s Attorney (“ASA”) assigned to the case indicating that it was her understanding that “the ATT used a stingray to locate[] your client via his cell phone,” but she was waiting for “the paperwork.” The next day, May 7, the ASA also notified defense counsel of exculpatory evidence in the form of a negative photo array that was conducted the previous January. On May 12, 2015, defense counsel requested that the court dismiss the case based on discovery violations and moved for suppression of evidence, including the gun, phone 7 records, and identification testimony. A few days later, on May 15, the State filed a supplemental disclosure, which provided: WATF did not have the Clifton Ave address as a possible location until ATT provided that information. Det. Spinnato recalls that he was in touch with Det. Haley from ATT. ATT was provided that information from Sprint in the form of GPS coordinates, Det. Spinnato received the same information either from Sprint directly, or forwarded from ATT. Det. Spinnato provided ATT with the phone number associated to Defendant from the shooting investigation and, [redacted in original]-Det. Spinnato recalls that ATT gave Det. Spinnato the Clifton Ave address in the afternoon/early evening on May 5, 2014. . . . The State’s supplemental disclosure also identified a second negative photo array conducted on May 4, 2014. Andrews’s initial motions were heard in the circuit court on May 12, 21, and June 4, 2015. At the conclusion of the hearing on June 4, the circuit court found that one of the lead investigators intentionally withheld exculpatory evidence—including both negative photo arrays. As a result, the circuit court partially granted the pending defense motion for sanctions and excluded that detective’s testimony from trial. The court declined to dismiss the case and denied the motion to exclude the gun and cell phone on the basis of the State’s withholding of discoverable materials. However, as a consequence of the State’s failure to timely disclose information concerning Hailstorm surveillance technology that was used by the BPD, the Court granted the defense additional time to file a motion to suppress. Motion to Suppress Andrews filed a Motion to Suppress—over 50 pages including exhibits—on June 30, 2015, in which he challenged the BPD’s surreptitious use of the Hailstorm cell site simulator to search Andrews’s phone, without a warrant, under the Fourth Amendment to 8 the United States Constitution. Andrews moved to suppress all evidence obtained from 5032 Clifton Avenue. During the ensuing hearing on the motion to suppress, held August 20, 2015, the State suggested, and the defense agreed, that the circuit court rely on the transcripts and exhibits from the earlier motions hearings for an understanding of the function of the Hailstorm device and its use by the BPD: [STATE’S ATTORNEY]: . . . The exact testimony that we’re going to hear about with regard to the Fourth Amendment issue Counsel heard as it related to the discovery issue because the discovery issue bled into the Fourth Amendment issue. So there is nothing new. There is nothing -- Counsel’s aware that the equipment is called Hailstorm not Stingray because of the testimony that Counsel heard and extracted from the detective as it relates to this very case. So there simply is, there is nothing new. We’re at the exact same issue that we were two months ago. THE COURT: So do we even need, do you need to call the witness or can I just rely on the transcript? [STATE’S ATTORNEY]: It would seem to me to rely on the transcript. *** THE COURT: . . . So the State is indicating that the testimony that the State would present today is the same testimony that was presented -[DEFENSE COUNSEL]: Right. THE COURT: -- there. [DEFENSE COUNSEL]: Right. THE COURT: And that’s in the transcript, and the Court can just rely on the transcript to rule on your motion. [DEFENSE COUNSEL]: Right. THE COURT: You’re fine with that? 9 [DEFENSE COUNSEL]: Yep. The court took a recess for several hours to review the motions and transcripts. The following excerpts from the June 4th hearing, entered as Defendant’s Exhibit 1C, pertain to the function of the cell site simulator: [DETECTIVE HALEY]: What happened in this case was, Detective Sp[innato] from our WATF, which is the Warrant Apprehension Unit, apparently interviewed somebody -- got a phone number. He then responds down here to the Circuit Court . . . and gets a Court Order signed. He then sends the Court order down to our office, depending on what the carrier is, Verizon, Sprint, T-Mobile, AT&T. We then send it to them. I ask for subscriber information, call-detail records. They provide us with GPS locations, in this case. And once we get all the information, then we have equipment that we can go out and locate cell phones. [DEFENSE COUNSEL]: Okay. When you say, we have equipment that we can locate cell phones, you’re talking about the Stingray equipment, is that what was used in this case? [DETECTIVE HALEY]: Yeah, it’s called the Hailstorm. It used to be -Stingray is kind of first generation. *** [DEFENSE COUNSEL]: Tell me what the Hailstorm does. [DETECTIVE HALEY]: What we get from the phone company is the subscriber information. So, when we get the subscriber information, it has a [sic] identifier on there, if you will, a serial number. We put that into the Hailstorm equipment. And the Hailstorm equipment acts like a cell tower. So, we go into a certain area, and basically, the equipment is looking for that particular identifier, that serial number. [DEFENSE COUNSEL]: Okay. And so, if a person is inside of a home, that equipment peers over the wall of the home, to see if that cell phone is behind the wall of that house, right? 10 [DETECTIVE HALEY]: Yes. [DEFENSE COUNSEL]: And it sends an electronic transmission through the wall of that house, correct? [DETECTIVE HALEY]: Yes. [DEFENSE COUNSEL]: Did you get a separate search warrant for that search into the home? [DETECTIVE HALEY]: You’d have to talk to Detective Spinnato about that. Because he’s the one that got the Court Order signed. [DEFENSE COUNSEL]: Did you do the search? You conducted the equipment in this -- you operated – [DETECTIVE HALEY]: Yes. [DEFENSE COUNSEL]: -- the equipment? [DETECTIVE HALEY]: Yes. *** [DEFENSE COUNSEL]: Tell me all of the information the Hailstorm can retrieve from a phone. [DETECTIVE HALEY]: It’s going to retrieve, like I said before, the serial number of the phone, depending on what kind of phone it is. It’s going to -there’s [sic] different identifiers. Like for Sprint, in this case, it’s called the MSID. And that’s like a ten-digit -- like a ten-digit number. So, it’s retrieving that. And there’s also the electronic serial number. It’s retrieving that. And that’s really it. [DEFENSE COUNSEL]: Can you capture the telephone calls as they’re being made? [DETECTIVE HALEY]: No. [DEFENSE COUNSEL]: And how do you know where the phone -- and it doesn’t capture any data on the phone? [DETECTIVE HALEY]: No. 11 [DEFENSE COUNSEL]: Are you sure? [DETECTIVE HALEY]: Yes. [DEFENSE COUNSEL]: So, how do you get information about where the phone is on the machine? [DETECTIVE HALEY]: Because when it captures that identifier that you put into the machine or the equipment, it then tells you -- it looks like a clock on the equipment. And it tells you where the signal’s coming from, like 12, 1, 2, 3 o’clock (indicating). And it will give you like a reading. Like if it says 1:00 at like an 80, well, then you know that you’re kind of close to it. But if it says 1:00 at like a 40, then you know that you’re probably within, I don’t know, probably, you know, 20 yards of it. [DEFENSE COUNSEL]: The person doesn’t have to be using their phone for you to get that information, do they? [DETECTIVE HALEY]: Actually, if they’re on their phone, then they’re already connected to -- in this case, the Sprint network. And we’re not going to be able to pull them off of that until they’re -- until they hang -- until they hang the call up. [DEFENSE COUNSEL]: So, they hang the call up. And the phone can be in their pocket, right? [DETECTIVE HALEY]: Correct. [DEFENSE COUNSEL]: And then you’re reaching in to grab an electronic signal about where that phone is? It’s not pinging, in other words, right? *** MR. HALEY: Like I said, our equipment acts like a cell tower. So, it draws the phone to our equipment. [DEFENSE COUNSEL]: But you just said, if the person’s on the phone, your equipment won’t work, right? [DETECTIVE HALEY]: Correct. 12 [DEFENSE COUNSEL]: So, it doesn’t act like a cell tower, because you can find the phone only when they are not on the phone, correct? [DETECTIVE HALEY]: Well, I would say it does act like a cell tower, because the only time that you’re going to connect -- the only time that you’re going to connect to the network, or to a tower is when you go to try to use it. [DEFENSE COUNSEL]: But you’re connecting to where the phone is, when they’re not on the phone, didn’t you just say that [DETECTIVE HALEY]: Maybe I’m getting confused, or I’m not understanding what you’re asking me. [DEFENSE COUNSEL]: My question to you was, for example, I have my phone in my pocket. And I’m sitting in my house, right? [DETECTIVE HALEY]: Okay. [DEFENSE COUNSEL]: And you want to know where I am, correct? [DETECTIVE HALEY]: Okay. *** [DEFENSE COUNSEL]: When I am not on my phone, you will drive by my house, and you will get a signal from my phone indicating where I am, right? [DETECTIVE HALEY]: Correct. [DEFENSE COUNSEL]: If I am using the phone, you won’t get that signal, right? [DETECTIVE HALEY]: Correct. [DEFENSE COUNSEL]: So, the phone cannot be in use. You are searching for my phone as you’re driving through my neighborhood, right? [DETECTIVE HALEY]: Yes. [DEFENSE COUNSEL]: And in order to get to my phone, you are sending an electronic signal into my house, right? [DETECTIVE HALEY]: Yes. 13 When the hearing resumed, the court made several preliminary findings, and invited counsel to respond. In regard to the pen register/trap & trace order, the court observed: I don’t find that Judge Williams’ order is invalid as a pen register or trap and trace, but I do find that the order does not authorize the use of Hailstorm and I . . . invite the State to tell me otherwise. *** So this is very different from an order authorizing, for example, GPS or cell site information, because that is information that’s generated by the phone. And my understanding of this equipment is essentially that it’s forcing the phone to emit information, or its taking information from the phone that the phone is not sort of on its own generating at the time which is very different. On the issue of whether Andrews’s arrest was lawful, the parties acknowledged that a valid warrant was outstanding for his arrest. However, the court questioned whether, as argued by defense counsel, Andrews’s presence at 5032 Clifton Avenue “or the warrant they got as a result of him being there is fruit of the poisonous tree because there was a violation of his Fourth Amendment rights by [Det. Haley] using the Hailstorm on this phone to locate him at that residence in the first place.” Looking then to the application for the warrant to search 5032 Clifton Avenue, the court noted that there was no independent corroboration for the warrant because, “all it says he was located at this address and so we want to search this address. I mean that’s really all it says.” After hearing argument, the circuit court found that “the use of the Hailstorm violates the Defendant’s Fourth Amendment rights,” and “any information generated from the use of the Hailstorm [must] be suppressed.” The court continued on the record: And so just so that I’m clear, it means that the jury cannot hear any testimony or evidence about information obtained from the Hailstorm, obtained through the Hailstorm device. And just so that I’m clear, it’s my 14 understanding that the Hailstorm device is what told the police that the Defendant was at that location. And so that includes any testimony or evidence then that the Defendant was at that location, if that’s what -- because that’s what the Hailstorm told the police. And so the jury would be prohibited from hearing evidence or testimony of that. It does not invalidate the arrest or the search [incident to] the arrest with the phone that’s in his pocket.[5] Now anything that came off the phone, again if it came through the Hailstorm device it is suppressed. There can be no evidence or testimony about it. And then again, any police knowledge that the Defendant was at that location again also suppressed, so the jury would not be able to hear any evidence or testimony of that. So then that leaves us with the fruit of the poisonous tree argument for the search and seizure warrant. I reviewed the warrant and it literally says the Defendant was in there so now we need a warrant. And information generated from the use of the Hailstorm be suppressed, that’s all that it is. And so I analyze this different, a little bit different from a normal sort of motion to suppress a search and seizure warrant or even Franks in terms of standing. I don’t -- I understand the State’s argument in terms of standing and this not being his residence, and the Defense’s argument that he was at a minimum an overnight guest and has some reasonable expectation of privacy. I don’t think I need to reach those issues because the warrant is really just fruit of the poisonous tree of the illegally obtained information about the Defendant’s location. That’s what it is. And so I am granting the suppression of that for that very reason. And so that the record is clear – and I know that the State is asking to take an appeal, the record is clear. The ruling of the Court is that the government violated the Defendant’s Fourth Amendment rights by essentially using the Hailstorm to locate him at that residence. The State noticed its appeal on September 3, 2015. 5 Mr. Andrews did not challenge the legality of his arrest or search incident to arrest, either in the circuit court or before this Court. He did, however, seek to suppress the cell phone, but that motion was denied and Mr. Andrews did not file a cross-appeal to contest that ruling. 15 DISCUSSION Motion to Dismiss Before turning to the merits, we must address Andrews’s motion to dismiss this appeal on the ground that the notice of appeal was defective, and therefore, not filed within the time prescribed by Rule 8-202. The State filed its notice of appeal on September 3, 2015; however, the signed certificate of service—indicating that a copy of the notice was “mailed first-class, postage prepaid” on that same day—failed to list the party that was served. Andrews acknowledges that a copy of the notice was delivered to the Office of the Public Defender on September 4, 2015. Nevertheless, Andrews argues that the State’s notice did not comply with the certificate of service requirements of Maryland Rule 1-323, and that the clerk should not have accepted the filing. Consequently, according to Andrews, no valid notice of appeal was filed in this case. The State concedes that the failure to name the party to be served was a defect in the certificate of service, but maintains the clerk was required to accept the filing because the certificate complied with the literal requirements of Rule 1-323. The State urges that it would be improper to dismiss the appeal because there is no dispute that the opposing party was served in a timely fashion. Maryland Rule 1-323 directs that the court clerk may not accept for filing a pleading or other paper requiring service, unless it is accompanied by “an admission or waiver of service or a signed certificate showing the date and manner of making service.” In Director of Finance of Baltimore City v. Harris, this Court addressed whether a certificate of service that failed to identify all the persons upon whom service was required should have been 16 rejected for filing by the court clerk. 90 Md. App. 506, 513-14 (1992). Looking to the 1984 revision of the Maryland Rules that produced the current Rule 1-323, this Court observed: Under the old Rule, the clerk may have had some obligation to determine whether the certificate actually showed service on the “opposite party.” But, as noted, that obligation, if it ever did exist, has been eliminated. . . . The obligation of the clerk under the current Rule is simply to assure that there is, in fact, an admission, a waiver, or a certificate showing the date and manner of service. If such a certificate is attached to the paper, the clerk must file the paper, leaving it then to the parties or the court to deal with any deficiency.[6] More recently, in Lovero v. Da Silva, this Court clarified that, by mandating that proof of service (or a waiver of service) appear on each pleading or paper, “Rule 1-323 assures the court . . . that each party has been duly notified before action is taken by the court in response to or as a result of the subject pleading or paper.” 200 Md. App. 433, 6 This Court further illuminated the evolution of Rule 1-323 stating: Rule 1-323 is derived ultimately from Rule 1(a)(2), Part Two, V, of the General Rules of Practice and Procedure, adopted by the Court of Appeals and approved by the General Assembly pursuant to 1939 Md. Laws, ch. 719, § 35A. Rule 1(a)(2) provided, in relevant part, that a paper “shall not be received and filed by the clerk of the court unless accompanied by an admission or proof of service of a copy thereof upon the opposite party or his attorney of record in accordance with this rule.” (Emphasis added.) Other parts of the Rule prescribed how service was to be made. That Rule was carried over into the Maryland Rules of Procedure as Rule 306 a.2., which stated that “[t]he clerk shall not accept or file any paper requiring service other than an original pleading unless it is accompanied by an admission or proof of service of a copy thereof upon the opposite party, or his attorney of record.” (Emphasis added.) Until the 1984 revision of the Maryland Rules, the Rule remained in that form. Harris, 90 Md. App. at 511-12. 17 446 (2011). We determined that Lovero’s notice of appeal should have been rejected by the clerk, explaining that [w]here, as in the instant case, the notice of appeal contains no proof of service whatsoever, we have no basis upon which to conclude that the notice of appeal was served on the opposing party or parties. Indeed, it is undisputed here that the Notice of Appeal was never served on Da Silva. Id. at 449. In the present case, there is no dispute that the notice was served on defense counsel. Indeed, the State made it clear at the August 20 hearing that it would be filing an appeal as reflected in the court’s ruling; “and so that the record is clear – and I know that the State is asking to take an appeal, the record is clear.” It is also clear now that, although the omission in the certificate of service is a defect, the certificate met the literal requirements of Rule 1-323—it provided the date and manner of service. Where there is no evidence that Andrews was prejudiced or that the course of the appeal was delayed by a defect, “it is the practice of this Court to decide appeals on the merits rather than on technicalities.” Bond v. Slavin, 157 Md. App. 340, 352-53 (2004). Cf. Williams v. Hofmann Balancing Techniques, Ltd., 139 Md. App. 339, 356-57 (2001) (holding that the appellant’s failure to identify one of the appellees on his notice of appeal did not deprive this Court of jurisdiction). To be sure, the Court of Appeals has observed that “[o]ur cases, and those of the Court of Special Appeals, have generally been quite liberal in construing timely orders for appeal.” Newman v. Reilly, 314 Md. 364, 386 (1988); see also Lovero, 200 Md. App. at 450-51 n.8 (and the cases cited therein) (recognizing that where a challenged notice of 18 appeal was timely filed the courts of Maryland construe the notice in favor of deciding the appeal on the merits). We deny Andrews’s motion to dismiss the appeal. Standard of Review We review the grant of a motion to suppress based on the record of the suppression hearing, and we view the facts in the light most favorable to the prevailing party. State v. Donaldson, 221 Md. App. 134, 138 (citing Holt v. State, 435 Md. 443, 457, 78 A.3d 415 (2013)), cert. denied, 442 Md. 745 (2015). Further, “we extend ‘great deference’ to the factual findings and credibility determinations of the circuit court, and review those findings only for clear error.” Id. (citing Brown v. State, 397 Md. 89, 98 (2007)). But we make an independent, de novo, appraisal of whether a constitutional right has been violated by applying the law to facts presented in a particular case. Williams v. State, 372 Md. 386, 401 (2002) (citations omitted); see also Brown, 397 Md. at 98 (“[W]e review the court’s legal conclusions de novo and exercise our independent judgment as to whether an officer’s encounter with a criminal defendant was lawful.” (Citation omitted)). I. Fourth Amendment Search In 1966, in the wake of prominent Congressional hearings on government invasions of privacy, Justice Douglas, dissenting in Osborn v. United States and Lewis v. United States, and concurring in Hoffa v. United States, observed: We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times; where there are no secrets from government. The aggressive breaches of privacy by the Government increase by geometric proportions. Wiretapping and ‘bugging’ run rampant, without effective judicial or legislative control. 19 *** Taken individually, each step may be of little consequence. But when viewed as a whole, there begins to emerge a society quite unlike any we have seen— a society in which government may intrude into the secret regions of man’s life at will. Osborn v. United States, 385 U.S. 323, 340-43 (1966) (Douglas, J., dissenting).7 Fifty years later we face the same concern—to what extent have advances in technology created an “age of no privacy.”8 The Fourth Amendment to the United States Constitution, made applicable to the States by the Fourteenth Amendment, Mapp v. Ohio, 367 U.S. 643, 655 (1961), provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. Const. amend. IV. The first clause protects individuals against unreasonable searches and seizures,9 see Katz v. United States, 389 U.S. 347, 359 (1967) (“Wherever a man may The question presented in Osborn, as cast by Justice Douglas, was “whether the Government may compound the invasion of privacy by using hidden recording devices to record incriminating statements made by the unwary suspect to a secret federal agent.” Osborn, 385 U.S. at 340. 7 See also City of Ontario, Cal. v. Quon, 560 U.S. 746, 760 (2010) (“Cell phone and text message communications are so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identification.”). 8 9 Although the parties do not present their arguments under the Maryland Constitution, Declaration of Rights, we note that Article 26—governing warrants for search and seizure—is generally construed to be co-extensive with the Fourth Amendment. See Upshur v. State, 208 Md. App. 383, 397 (2012) (citing Hamel v. State, 179 Md. App. 1, 18 (2008)). Article 26 of the Maryland Declaration of Rights provides: 20 be, he is entitled to know that he will remain free from unreasonable searches and seizures[]”), and the second clause requires that warrants must be particular and supported by probable cause, see Payton v. New York, 445 U.S. 573, 584 (1980). A “search” within the meaning of the Fourth Amendment occurs where the government invades a matter in which a person has an expectation of privacy that society is willing to recognize as reasonable. Kyllo v. United States, 533 U.S. 27, 33 (2001) (citing Katz, 389 U.S. at 361 (Harlan, J., concurring)). As we made clear in Raynor v. State, “[t]he burden of demonstrating a ‘legitimate’ or ‘reasonable’ expectation of privacy includes both a subjective and an objective component.” 201 Md. App. 209, 218 (2011), aff’d, 440 Md. 71 (2014) (citation and footnote omitted). “[I]n order to claim the protection of the Fourth Amendment, a defendant must demonstrate that he personally has an expectation of privacy in the place searched, and that his expectation is reasonable; i.e., one that has ‘a source outside of the Fourth Amendment, either by reference to concepts of real or personal property law or to understandings that are recognized and permitted by society.’” Minnesota v. Carter, 525 U.S. 83, 88 (1998) (quoting Rakas v. Illinois, 439 U.S. 128, 14344 n.12 (1978)). That all warrants, without oath or affirmation, to search suspected places, or to seize any person or property, are grievous and oppressive; and all general warrants to search suspected places, or to apprehend suspected persons, without naming or describing the place, or the person in special, are illegal, and ought not to be granted. 21 The Fourth Amendment protects not against all intrusions as such, “but against intrusions which are not justified in the circumstances, or which are made in an improper manner.” Maryland v. King, 133 S. Ct. 1958, 1969 (2013) (emphasis added) (quoting Schmerber v. California, 384 U.S. 757, 768 (1966)). “Although the underlying command of the Fourth Amendment is always that searches and seizures be reasonable, what is reasonable depends on the context within which a search takes place.” State v. Alexander, 124 Md. App. 258, 265 (1998) (emphasis added in Alexander) (quoting New Jersey v. T.L.O., 469 U.S. 325, 337 (1985)). Subject to a few well-delineated exceptions, “warrantless searches ‘are per se unreasonable under the Fourth Amendment.’” Quon, 560 U.S. at 760 (2010) (quoting Katz, 389 U.S. at 357); see also United States v. Karo, 468 U.S. 705, 717 (1984) (citations omitted). a. Effects of the Nondisclosure Agreement Before we examine the reasonableness of the State’s intrusion in context, we address the nondisclosure agreement entered into between the State’s Attorney for Baltimore City and the Federal Bureau of Investigation in early August 2011 as a condition of BPD’s purchase of certain “wireless collection equipment/technology manufactured by Harris [Corporation].” The nondisclosure agreement provided, in part: [T]o ensure that [] wireless collection equipment/technology continues to be available for use by the law enforcement community, the equipment/technology and any information related to its functions, operation, and use shall be protected from potential compromise by precluding disclosure of this information to the public in any manner including b[ut] not limited to: in press release, in court documents, during judicial hearings, or during other public forums or proceedings. Accordingly, the Baltimore City Police Department agrees to the following 22 conditions in connection with its purchase and use of the Harris Corporation equipment/technology: *** 5. The Baltimore City Police Department and Office of the State’s Attorney for Baltimore City shall not, in any civil or criminal proceeding, use or provide any information concerning the Harris Corporation wireless collection equipment/technology, its associated software, operating manuals, and any related documentation (including its technical/engineering description(s) and capabilities) beyond the evidentiary results obtained through the use the equipment/technology including, but not limited to, during pre-trial matters, in search warrants and related affidavits, in discovery, in response to court ordered disclosure, in other affidavits, in grand jury hearings, in the State’s case-in-chief, rebuttal, or on appeal, or in testimony in any phase of civil or criminal trial, without the prior written approval of the FBI. ... (Emphasis added). The agreement directs that in the event of a Freedom of Information Act request, or a court order directing disclosure of information regarding Harris Corporation equipment or technology, the FBI must be notified immediately to allow them time to intervene “and potential[ly] compromise.” If necessary “the Office of the State’s Attorney for Baltimore will, at the request of the FBI, seek dismissal of the case in lieu of using or providing, or allowing others to provide, any information concerning the Harris Corporation wireless collection equipment/technology[.]” We observe that such an extensive prohibition on disclosure of information to the court—from special order and/or warrant application through appellate review—prevents the court from exercising its fundamental duties under the Constitution. To undertake the Fourth Amendment analysis and ascertain “the reasonableness in all the circumstances of the particular governmental invasion of a citizen’s personal security,” Terry v. Ohio, 392 23 U.S. 1, 19 (1968), it is self-evident that the court must understand why and how the search is to be conducted. The reasonableness of a search or seizure depends “‘on a balance between the public interest and the individual’s right to personal security free from arbitrary interference by law officers.’” Pennsylvania v. Mimms, 434 U.S. 106, 109 (1977) (emphasis added) (quoting United States v. Brignoni-Ponce, 422 U.S. 873, 878 (1975)). The analytical framework requires analysis of the functionality of the surveillance device and the range of information potentially revealed by its use. A nondisclosure agreement that prevents law enforcement from providing details sufficient to assure the court that a novel method of conducting a search is a reasonable intrusion made in a proper manner and “justified by the circumstances,” obstructs the court’s ability to make the necessary constitutional appraisal. Cf. King, 133 S. Ct. at 1970 (“Even if a warrant is not required, a search is not beyond Fourth Amendment scrutiny; for it must be reasonable in its scope and manner of execution. Urgent government interests are not a license for indiscriminate police behavior.”). In West v. State, this Court stated that “to assure that the purpose of the Fourth Amendment is upheld, police officers must provide details within affidavits when attempting to acquire search warrants, even if such information would seem to the police officer of trivial consequence at the time.” 137 Md. App. 314, 331 (2001). As discussed further in Section III infra, it appears that as a consequence of the nondisclosure agreement, rather than apply for a warrant, prosecutors and police obtained an order under the Maryland pen register statute that failed to provide the necessary information upon which the court could make the constitutional assessments mandated in this case. The BPD certified to the court that pursuant to the order “the information likely 24 to be obtained concerning the aforesaid individual’s location will be obtained by learning the numbers, locations and subscribers of the telephone number(s) being dialed or pulsed from or to the aforesaid telephone . . . .” However, the suppression court, having the benefit of Det. Haley’s testimony (reproduced above), learned that the BPD actually employed the Hailstorm device, which is capable of obtaining active real-time location information—far different from a pen register (a device or process that records and decodes dialing, routing, addressing, or signaling information transmitted by an instrument) or track and trace device (a device or process that captures the incoming electronic or other impulses that identify the originating number). See fn.2 supra.10 We perceive the State’s actions in this case to protect the Hailstorm technology, driven by a nondisclosure agreement to which it bound itself, as detrimental to its position and inimical to the constitutional principles we revere. b. What Constitutes a “Search”—Level of Intrusion and Expectation of Privacy The State argues that the use of a cell site simulator does not constitute a “search” under the Fourth Amendment. The State maintains that the circuit court’s decision “was based upon both factually unreasonable conclusions about how the cell site simulator worked in this case, and legally incorrect determinations about what constitutes a ‘search.’” The State acknowledges that the factual bases for the circuit court’s rulings are found in the June 4, 2015 testimony of Det. Haley. However, the State argues that Det. Haley’s 10 It is not clear from the record whether Det. Haley’s testimony was authorized through written approval from the FBI as required in paragraph 5 of the nondisclosure agreement. 25 testimony “was necessarily rather summary,” and does not support the factual conclusions of the circuit court. According to the State, the cell site simulator “acts like a cell tower, and waits to receive a signal bearing the target IMSI” [International Mobil Subscriber Identity]. The State maintains that, properly construed, Det. Haley’s testimony reveals that “the process of a cell phone sending its identifying information to a cell tower was indistinguishable from the process of a cell phone sending its identifying information to a cell site simulator.” The State asserts that the Hailstorm device “merely reads the ID number regularly transmitted by activated cell phones as part of their ordinary use” and “[w]hen the device detects a signal from the target phone, it notifies the operator the direction of the signal and the relative strength, allowing the operator to estimate the probable location of the phone.” Therefore, the State argues that no reasonable expectation of privacy existed in the information obtained by the Hailstorm device and no intrusion or “search” occurred. Andrews countercharges that there was ample, explicit support in the record for the circuit court’s finding that the Hailstorm device operated by emitting a signal “through the wall of a house” and “into the phone” triggering the phone to respond to the device. Andrews argues that, through the use of an “active cellular surveillance device,” the State violated his reasonable expectation of privacy in the personal information contained and generated by his cell phone, without which the government would not have been able to discover his location inside the home. Presumably because of the nondisclosure agreement discussed above, the State provided limited information regarding the function and use of the Hailstorm device. And 26 presumably, the State would have limited itself in this manner regardless of whether it relied on testimony from the prior hearing or produced live testimony before the suppression court.11 Notwithstanding this, it is clear from Det. Haley’s testimony that “the Hailstorm equipment acts like a cell tower,” but, unlike a cell tower awaiting incoming signals, the Hailstorm is an active device that can send an electronic signal through the wall of a house and “draw[] the phone to [the] equipment.” Based on the direction and strength of the signal the Hailstorm receives from a cell phone in response, law enforcement can pinpoint the real-time location of a cell phone (and likely the person to whom it belongs) within less than 20 yards. These points from Det. Haley’s testimony regarding the function of the Hailstorm device are consistent with what other courts and legal scholars have been able to discern about the device. Hailstorm, along with the earlier-model cell site simulator known as “StingRay,” to which Det. Haley referred, are far from discrete, limited surveillance tools. Rather, as described in a recent article in the Harvard Journal of Law and Technology cited by Appellee and the amici:12 This technology, commonly called the StingRay, the most well-known brand name of a family of surveillance devices known more generically as “IMSI 11 In a suppression hearing, “[w]here . . . the defendant establishes initially that the police proceeded warrantlessly, the burden shifts to the State to establish that strong justification existed for proceeding under one of the ‘jealously and carefully drawn’ exceptions to the warrant requirement.” Jones v. State, 139 Md. App. 212, 226 (2001) (citation omitted). Where the evidence presented is inconclusive, the consequence for the State is that the defendant wins. Id. 12 In addition to the ACLU and EFF, Professor David Gray of the University of Maryland Francis King Carey School of Law filed a detailed and informative amicus brief in this case. 27 catchers,” is used by law enforcement agencies to obtain, directly and in real time, unique device identifiers and detailed location information of cellular phones—data that it would otherwise be unable to obtain without the assistance of a wireless carrier. *** By impersonating a cellular network base station, a StingRay—a surveillance device that can be carried by hand, installed in a vehicle, or even mounted on a drone—tricks all nearby phones and other mobile devices into identifying themselves (by revealing their unique serial numbers) just as they would register with genuine base stations in the immediate vicinity. As each phone in the area identifies itself, the StingRay can determine the location from which the signal came. Stephanie K. Pell & Christopher Soghoian, A Lot More Than A Pen Register, and Less Than A Wiretap: What the Stingray Teaches Us About How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities, 16 Yale J. L. & Tech. 134, 142, 145-46 (2014) (emphasis added; footnotes omitted). The Supreme Court of Wisconsin examined whether law enforcement could obtain location data through cell site information or a StingRay pursuant to a warrant and, before holding that the warrant was sufficiently particularized, based on probable cause, and passed constitutional muster, observed: A stingray is an electronic device that mimics the signal from a cellphone tower, which causes the cell phone to send a responding signal. If the stingray is within the cell phone’s signal range, the stingray measures signals from the phone, and based on the cell phone’s signal strength, the stingray can provide an initial general location of the phone. By collecting the cell phone’s signals from several locations, the stingray can develop the location of the phone quite precisely. State v. Tate, 849 N.W.2d 798, 826 n.8 (Wisc. 2014) (citation omitted), cert. denied, 135 S. Ct. 1166 (2015); see also, e.g., In re Application for Pen Register and Trap/Trace Device 28 with Cell Site Location Authority, 396 F. Supp. 2d 747, 755 (S.D. Tex. 2005) (defining an earlier-model device, the “Triggerfish,” as equipment that “enables law enforcement to gather cell site location information directly, without the assistance of the service provider”). We cannot say that the factual findings of the circuit court, in this case, were erroneous; they are firmly grounded in the testimony before that court, and the State has provided no evidence to the contrary. In determining then whether a Fourth Amendment “search” occurred, we apply the court’s factual findings to the test pronounced in Katz, supra. Rather than limit the constitutional appraisal to a trespass analysis,13 the Katz test requires a two-fold showing: “first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as ‘reasonable.’” 389 U.S. at 361 (Harlan, J., concurring).14 Even under the more flexible Katz test, however, rapid In Olmstead v. United States, the Supreme Court held that the government’s use of a wire-tapping device over an extended period of time did not constitute a violation of the Fourth Amendment because the wires were installed in a manner that did not constitute a trespass upon the property of the petitioners. 277 U.S. 438, 464 (1928). Thus, the Court stated that a Fourth Amendment violation would occur where there was a tangible, physical intrusion by the government. Cf. id. at 466. Olmstead was overruled in part by the Court in Katz. 389 U.S. at 353. 13 14 Maryland appellate courts have, so far, only addressed the admissibility of historical CSLI obtained from a service provider. See State v. Payne, 440 Md. 680, 69091 (2014) (stating that whether a detective “should have been qualified as an expert before being allowed to engage in the process of identifying the geographic location of the cell towers and the locations themselves depends on understanding just what are cell phone records and what their contents reveal.”); Hall v. State, 225 Md. App. 72, 91 (2015) (concluding that the State’s witness was properly qualified as an expert to testify regarding the mapping of appellant’s cell phone data); Stevenson v. State, 222 Md. App. 118, 129-30 (determining that a Frye-Reed hearing on admissibility of novel scientific evidence and expert scientific testimony was not required for admission of cellular tower “ping” 29 advancements in technology make ascertaining what constitutes a search under the Fourth Amendment ever more challenging.15 Charles Katz was charged with transmitting wagering information by telephone in violation of federal law. Katz, 389 U.S. at 348. He objected during his trial to the evidence), cert. denied, 443 Md. 737 (2015); Wilder v. State, 191 Md. App. 319, 364 (2010) (holding that the admission of CSLI required the qualification of the sponsoring witness as an expert); Coleman-Fuller v. State, 192 Md. App. 577, 619 (2010) (same). Maryland courts have not previously addressed CSLI in the context of a Fourth Amendment challenge and have never addressed police use of cell site simulators or obtaining real-time CSLI. Because key factual distinctions in this case involve the function of Hailstorm and the ability of law enforcement to track a cell phone directly and in real time, our own cases provide limited guidance. See generally Renée McDonald Hutchins, Tied Up In Knotts? GPS Technology and The Fourth Amendment, 55 UCLA L. Rev. 409 (2007). Professor Hutchins notes that the Supreme Court has developed a differential treatment in its intrusiveness analysis under the Fourth Amendment based on the type of information revealed, explaining: 15 When gauging the objective reasonableness of various privacy expectations, the Court has leaned heavily on its assessment of the type of information revealed to segregate challenged surveillance technologies into two rough groups: sense-augmenting surveillance and extrasensory surveillance. Sense augmenting surveillance refers to surveillance that reveals information that could theoretically be attained through one of the five human senses. With regard to this type of surveillance, the Court has tended to find that simple mechanical substitutes for or enhancements of human perception typically trigger no Fourth Amendment concerns in cases in which human perception alone would not have required a warrant. Extrasensory surveillance, conversely, is that which reveals information otherwise indiscernible to the unaided human senses. The Court has adopted a more privacy-protective view of this form of technologically enhanced police conduct. In fact, the case law suggests that surveillance of this type is largely prohibited in the absence of a warrant. Id. at 432-33. 30 government’s introduction of evidence collected by FBI agents who overheard and recorded his end of telephone conversations from inside a public telephone booth. Id. The agents had placed a recording device on the outside of the phone booth from which Katz placed his calls. Id. The government contended on appeal that their surveillance did not constitute a search prohibited by the Fourth Amendment because Katz was in a public location that was not constitutionally protected and because the technique they employed involved no physical penetration of the telephone booth. Id. at 352. Writing for the majority, Justice Stewart rejected the formulation of the issues by the parties, premised on whether the telephone booth was a “constitutionally protected area,” and instructed that “[t]he Fourth Amendment protects people, not places . . . what [Katz] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Id. at 361 (citations omitted). The Court continued, stating that “once it is recognized that the Fourth Amendment protects people—and not simply ‘areas’—against unreasonable searches and seizures it becomes clear that the reach of that Amendment cannot turn upon the presence or absence of a physical intrusion into any given enclosure.” Id. at 350, 353. Almost 20 years after establishing in Katz that an examination of intrusiveness under the Fourth Amendment is not simply measured by physical invasion, the Supreme Court addressed the constitutionality of the government’s surreptitious use of a radio transmitter to track the movements of a container to and inside a private residence. United States v. Karo, supra, 468 U.S. at 709-10. The physical installation of the transmitter was not at issue; rather, the question before the Court was “whether the monitoring of a beeper in a private residence, not open to visual surveillance, violates the Fourth Amendment 31 rights of those who have a justifiable interest in the privacy of the residence.” Id. at 714. Although the Court noted that the monitoring of an electronic device is “less intrusive than a full-scale search,” it, nevertheless, reveals information about the interior of the residence that the government “could not have otherwise obtained without a warrant.” Id. at 715. The Supreme Court stated: We cannot accept the Government’s contention that it should be completely free from the constraints of the Fourth Amendment to determine by means of an electronic device, without warrant and without probable cause or reasonable suspicion, whether a particular article—or a person, for that matter—is in an individual’s home at a particular time. Indiscriminate monitoring of property that has been withdrawn from public view would present far too serious a threat to privacy interests in the home to escape entirely some sort of Fourth Amendment oversight. Id. at 716 (footnote omitted). Notably, the Court also soundly rejected the government’s contention that it should be able to engage in warrantless monitoring of an electronic device inside a private residence “if there is the requisite justification in the facts for believing that a crime is being or will be committed and that monitoring the beeper wherever it goes is likely to produce evidence of criminal activity.” Id. at 717 (emphasis added). The Court recognized limited exceptions to the general rule, such as in the case of exigency, but explained why in its view the government exaggerated the difficulties associated with obtaining a warrant: The Government argues that the traditional justifications for the warrant requirement are inapplicable in beeper cases, but to a large extent that argument is based upon the contention, rejected above, that the beeper constitutes only a minuscule intrusion on protected privacy interests. The primary reason for the warrant requirement is to interpose a ‘neutral and detached magistrate’ between the citizen and ‘officer engaged in the often competitive enterprise of ferreting out crime.’ 32 *** The Government contends that it would be impossible to describe the ‘place’ to be searched, because the location of the place is precisely what is sought to be discovered through the search. [ ] However true that may be, it will still be possible to describe the object into which the beeper is to be placed, the circumstances that led agents to wish to install the beeper, and the length of time for which beeper surveillance is requested. Id. at 717-18 (citing Johnson v. United States, 333 U.S. 10, 14 (1948)). In Kyllo, supra, the Supreme Court considered whether a Fourth Amendment search had occurred when the government used a thermal imaging device to detect infrared radiation inside a home. 533 U.S. at 29-30. Federal agents, suspecting that Danny Kyllo was growing marijuana inside his home, were able to confirm areas of heat coming from high intensity lamps used to grow marijuana plants indoors. Id. At the threshold of his analysis, Justice Scalia, writing for the majority, observed: It would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment has been entirely unaffected by the advance of technology. . . . The question we confront today is what limits there are upon this power of technology to shrink the realm of guaranteed privacy. Id. at 33-34. The Court then noted that, although the Katz test—“whether the individual has an expectation of privacy that society is prepared to recognize as reasonable”—may be difficult to apply to some locations, such as telephone booths and automobiles—the expectation of privacy in the home had “roots deep in the common law.” Id. at 34. In support of the use of its thermal imaging technology, the government in Kyllo argued that there was no “search” because the device detected “‘only heat radiating from the external surface of the house[.]’” Id. at 35. The Supreme Court, however, cast aside 33 this contention as the kind of mechanical interpretation rejected in Katz and stated, “so also a powerful directional microphone picks up only sound emanating from a house—and a satellite capable of scanning from many miles away would pick up only visible light emanating from a house.” Id. Rather than abandon Katz and take such a mechanical approach, the Court sought to adopt a rule “tak[ing] account of more sophisticated [surveillance] systems that are already in use or in development.” Id. at 35-36 (footnote omitted). Accordingly, the Court held that “[w]here . . . the Government uses a device that is not in general public use, to explore the details of the home that would previously have been unknowable without physical intrusion, the surveillance is a ‘search’ and is presumptively unreasonable without a warrant.” Id. at 40. Furthermore, the Court repeated the caveat of Silverman v. United States, that the “protection of the home has never been tied to the measurement of the quality or quantity of information obtained” for any invasion of the home, “‘by even a fraction of an inch’ [is] too much.” Id. at 37 (quoting Silverman, 365 U.S. 505, 512 (1961)). From Katz to Kyllo, the Supreme Court has firmly held that use of surveillance technology not in general public use to obtain information about the interior of a home, not otherwise available without trespass, is a “search” under the Fourth Amendment. These decisions resolved to protect an “expectation of privacy that society is prepared to recognize as reasonable.” After Kyllo, however, the question remained whether electronic tracking or surveillance outside the home could constitute a search under the Fourth Amendment. 34 In United States v. Jones, the Supreme Court reviewed the use of a GPS tracking device affixed to the undercarriage of a vehicle to track the movements of the defendant over a period of 28 days. 132 S. Ct. 945, 948 (2012). The Court unanimously affirmed the United States Court of Appeals for the District of Columbia Circuit’s holding that the electronic location surveillance over a period of 28 days was a search and that admission of evidence obtained by the warrantless use of the GPS device violated the Fourth Amendment. The Court was unable, however, to reach full agreement as to the basis for its decision. See id. at 953 (majority opinion); 954 (Sotomayor, J., concurring); 967 (Alito, J., concurring in the judgment). Justice Scalia’s majority opinion found that a search occurred under the traditional, pre-Katz “trespass” rationale, but acknowledged that “[s]ituations involving merely the transmission of electronic signals without trespass would remain subject to Katz analysis.” Id. at 953 (emphasis in original). Agreeing with Justice Brennan’s concurrence in Knotts v. United States, Justice Scalia expounded that “‘when the Government does engage in physical intrusion of a constitutionally protected area in order to obtain information, that intrusion may constitute a violation of the Fourth Amendment.’” Id. at 951 (quoting Knotts, 460 U.S. 276, 286 (1983)). When law enforcement placed the GPS tracking system on Jones’s vehicle, without a warrant, the government physically invaded a constitutionally protected area, id. at 949, 952, and factors beyond trespass need not be considered to find there was a Fourth Amendment violation. Id. at 953-54. Justice Scalia explained that the common-law trespass test was essentially a minimum test and that the Katz test was “added to, not substituted for, the common-law trespassory test.” Id. at 952. 35 Justice Sotomayor revisited the Katz analysis in her concurring opinion, stating that, “even in the absence of a trespass, ‘a Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable.’” Id. at 954-55 (Sotomayor, J., concurring) (citations omitted). Recognizing that “[i]n cases of electronic or other novel modes of surveillance that do not depend upon a physical invasion on property, the majority opinion’s trespassory test may provide little guidance[,]” Justice Sotomayor opined that the unique attributes of GPS location surveillance will require careful application of the Katz analysis. Id. She urged the Court to update its understanding of peoples’ expectations of privacy in the information age: GPS monitoring generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e.g., People v. Weaver, 12 N.Y.3d 433, 441–442, 882 N.Y.S.2d 357, 909 N.E.2d 1195, 1199 (2009) (“Disclosed in [GPS] data . . . will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on”). The Government can store such records and efficiently mine them for information years into the future. [United States v.] Pineda–Moreno, 617 F.3d[ 1120,] 1124 [(9th Cir. 2010)] (opinion of Kozinski, C.J.). And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: “limited police resources and community hostility.” Illinois v. Lidster, 540 U.S. 419, 426, 124 S.Ct. 885, 157 L.Ed.2d 843 (2004). Awareness that the Government may be watching chills associational and expressive freedoms. And the Government’s unrestrained power to assemble data that reveal private aspects of identity is susceptible to abuse. The net result is that GPS monitoring—by making available at a relatively low cost such a substantial quantum of intimate information about any person whom the Government, in its unfettered discretion, chooses to track—may “alter the relationship between citizen and government in a way that is 36 inimical to democratic society.” United States v. Cuevas–Perez, 640 F.3d 272, 285 (C.A.7 2011) (Flaum, J., concurring). I would take these attributes of GPS monitoring into account when considering the existence of a reasonable societal expectation of privacy in the sum of one’s public movements. I would ask whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on. I do not regard as dispositive the fact that the Government might obtain the fruits of GPS monitoring through lawful conventional surveillance techniques. See Kyllo, 533 U.S., at 35, n.2, 121 S.Ct. 2038; ante, at 954 (leaving open the possibility that duplicating traditional surveillance “through electronic means, without an accompanying trespass, is an unconstitutional invasion of privacy”). I would also consider the appropriateness of entrusting to the Executive, in the absence of any oversight from a coordinate branch, a tool so amenable to misuse, especially in light of the Fourth Amendment’s goal to curb arbitrary exercises of police power to and prevent “a too permeating police surveillance,” United States v. Di Re, 332 U.S. 581, 595, 68 S.Ct. 222, 92 L.Ed. 210 (1948). Jones, 132 S. Ct. at 955-56 (Sotomayor, J., concurring) (footnote omitted). Justice Alito, concurring only in the judgment, disagreed with the majority’s reliance on a trespassory theory. Jones, 132 S. Ct. at 958. Instead, Justice Alito found the appropriate inquiry to be “whether respondent’s reasonable expectations of privacy were violated by the long-term monitoring of the movements of the vehicle he drove.” Id. Justice Alito stated that the majority’s reasoning “disregard[ed] what is really important (the use of a GPS for the purpose of long-term tracking)” and “will present particularly vexing problems in cases involving surveillance that is carried out by making electronic, as opposed to physical, contact with the item to be tracked.” Id. at 962 (emphasis in original). 37 From the above precedent, we glean two broad principles regarding the Fourth Amendment analysis of surveillance technology. First, where surveillance technology is used without a warrant to obtain information about the contents of a home, not otherwise discernable without physical intrusion, there has been an unlawful search. See Kyllo, 533 U.S. at 34-35. Second, where the government has engaged in surveillance using “electronic signals without trespass[,]” the intrusion will “remain subject to Katz analysis.” Jones, 132 S. Ct. at 953 (emphasis in original). The Supreme Court has recognized, however, that cell phones present novel privacy concerns. In Riley, supra, the Supreme Court made clear that a search of the information contained in a cell phone is subject to the warrant requirement regardless of its location. 134 S. Ct. at 2489-91. The Court held that even during a search incident to arrest, the government must first obtain a warrant before searching the digital contents of a cell phone found on the person being arrested. Id. at 2485-86. Chief Justice Roberts described the modern cell phone as much more than a phone: Cell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person. The term “cell phone” is itself misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers. One of the most notable distinguishing features of modern cell phones is their immense storage capacity. Before cell phones, a search of a person was limited by physical realities and tended as a general matter to constitute only a narrow intrusion on privacy. Most people cannot lug around every piece of mail they have received for the past several months, every picture they have taken, or every book or article they have read—nor would they have any reason to attempt to do so. And if they did, they would have to drag 38 behind them a trunk of the sort held to require a search warrant in Chadwick, supra, rather than a container the size of the cigarette package in Robinson. Id. at 2489. The State argues that its use of the Hailstorm here should be analogized to Knotts, 460 U.S. 276, wherein the Supreme Court upheld law enforcement officers’ use of a radio transmitter to track the movements of a container, by automobile, to a defendant’s home. In Knotts, the Court noted that “[t]he governmental surveillance conducted by means of the beeper in this case amounted principally to the following of an automobile on public streets and highways.” Id. at 281. The Court concluded that: A person travelling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another. When [the defendant] travelled over the public streets he voluntarily conveyed to anyone who wanted to look the fact that he was travelling over particular roads in a particular direction, the fact of whatever stops he made, and the fact of his final destination when he exited from public roads onto private property. Id. at 281-82. Here, the State argues that because Andrews’s cell phone was “constantly emitting ‘pings’ giving its location to the nearest cell tower, . . . there can be no reasonable expectation of privacy in [that] information” under Knotts. The State’s reliance on Knotts, however, is misplaced. In Karo, the Supreme Court clarified that in Knotts the electronic device “told the authorities nothing about the interior of Knotts’ cabin.” 468 U.S. at 715. Rather, the information obtained in Knotts was “voluntarily conveyed to anyone who wanted to look[,]” id. (quoting Knotts, 460 U.S. at 281), and the subsequent search warrant was also supported by “intermittent visual surveillance” of the cabin, Knotts, 460 U.S. at 279. As noted in Kyllo, the Supreme Court 39 has long recognized that “[v]isual surveillance [i]s unquestionably lawful because ‘the eye cannot by the laws of England be guilty of a trespass.’” 533 U.S. at 31-32 (quoting Boyd v. United States, 116 U.S. 616, 628 (1886)). Here, there was no visual surveillance. The mere fact that police could have located Andrews within the residence by following him as he travelled over public thoroughfares does not change the fact that the police did not know where he was, so they could not follow him. Unlike Knotts, the information obtained in this case did reveal at least one critical detail about the residence; i.e., that its contents included Andrews’s cell phone, and therefore, most likely Andrews himself. Further, “pings” from Andrews’s cell phone to the nearest tower were not available “to anyone who wanted to look.” We find the surreptitious conversion of a cell phone into a tracking device and the electronic interception of location data from that cell phone markedly distinct from the combined use of visual surveillance and a “beeper to signal the presence of [the defendant’s] automobile to the police receiver” to track a vehicle over public roads. See Knotts, 460 U.S. at 282. Put simply, the information obtained by police in this case was not readily available and in the public view as it was in Knotts. Cell site simulators, such as Hailstorm, can locate and track the movements of a cell phone and its user across both public and private spaces. Unchecked, the use of this technology would allow the government to discover the private and personal habits of any user. As Justice Sotomayor predicted in her concurring opinion in Jones, supra, we are compelled to ask “whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, 40 their political and religious beliefs, sexual habits, and so on.” 132 S. Ct. at 956 (Sotomayor, J., concurring). We conclude that they do not. We agree with the United States Court of Appeals for the Fourth Circuit in United States v. Graham, in declaring, “[w]e cannot accept the proposition that cell phone users volunteer to convey their location information simply by choosing to activate and use their cell phones and to carry the devices on their person.” 796 F.3d 332, 355 (4th Cir.), reh’g en banc granted, 624 F. App’x 75 (4th Cir. 2015).16 Federal courts reviewing pen register\trap & trace applications have similarly recognized a reasonable expectation of privacy in cell site location information. See, e.g., In re the Application of the United States for an Order Authorizing (1) Installation and Use of a Pen Register and Trap and Trace Device or Process, (2) Access to Customer Records, and (3) Cell Phone Tracking, 441 F. Supp. 2d 816, 837 (S.D. Tex. 2006) (“[D]etailed location information, such as triangulation and GPS data, … unquestionably implicate Fourth Amendment privacy rights.”); In re 16 The recent cell phone encryption battle between Apple and the United States Government illustrates how fervently people care about protecting their personal location information. In 2011, consumers learned that their iPhones stored months of data regarding Wi-Fi hotspots and cell towers around their location in a format that was not encrypted. The ensuing barrage of complaints caused Apple to revise its operating system to protect consumers’ location information. Apple, Inc. Press Release, Apple Q&A on Location Data (April 27, 2011) (available at https://www.apple.com/pr/library/2011/04/27Apple-Q-Aon-Location-Data.html) [https://perma.cc/PJ5V-KHGE]. Apple refused to comply with a court order to create software to disable certain security protections of an iPhone. See Testimony of Bruce Sewell, Encryption Tightrope: Balancing American’s Security and Privacy, Hearing before the House Comm. on the Judiciary, 114th Cong. (March 1, 2016); Timothy B. Lee, Apple's Battle with the FBI over iPhone Security, Explained, Vox (Feb. 17, 2016), http://www.vox.com/2016/2/17/11037748/fbi-apple-san-bernardino [http://perma.cc/4MFA-JZ4D]. 41 Application of the United States for an Order Authorizing Installation and Use of a Pen Register and a Caller Identification System on Telephone Numbers (Sealed), 402 F. Supp. 2d 597, 604–05 (D. Md. 2005) (recognizing that monitoring of cell phone location information is likely to violate a reasonable expectation of privacy)). We also accept the circuit court’s finding in this case that “no one expects that their phone information is being sent directly to the police department on their apparatus.”17 Recognizing that the Fourth Amendment protects people and not simply areas, Katz, 389 U.S. at 353, we conclude that people have a reasonable expectation of privacy in real-time cell phone location information. Moreover, because the use of the cell site simulator in this case revealed the location of the phone and Andrews inside a residence, we are presented with the additional concern that an electronic device not in general public use has been used to obtain information about the contents of a home, not otherwise discernable without physical intrusion. See Kyllo, 533 U.S. at 34-35. Under the applicable precedent, this is undoubtedly an intrusion that rises to the level of a Fourth Amendment “search.” See id. Indeed, “the Fourth Amendment draws a firm line at the entrance to the house[.]” Id. at 40 (citation and internal quotation marks omitted). Although we recognize that the use of a cell site simulator to track a phone will not always result in locating the phone within a residence, we agree with the Fourth Circuit’s observation that “the government cannot know in advance of obtaining As the Supreme Court stated in Katz, “[t]o read the Constitution more narrowly is to ignore the vital role that the … telephone has come to play in private communication.” 389 U.S. at 352. 17 42 this information how revealing it will be or whether it will detail the cell phone user’s movements in private spaces.” Graham, 796 F.3d at 350 (citation omitted). The United States District Court for the District of Maryland articulated the same concern when addressing the government’s use of a particular cell phone as a tracking device to aid in execution of an arrest warrant. The district court stated: Location data from a cell phone is distinguishable from traditional physical surveillance because it enables law enforcement to locate a person entirely divorced from all visual observation. Indeed, this is ostensibly the very characteristic that makes obtaining location data a desirable method of locating the subject of an arrest warrant. This also means, however, that there is no way to know before receipt of location data whether the phone is physically located in a constitutionally-protected place. In other words, it is impossible for law enforcement agents to determine prior to obtaining real-time location data whether doing so infringes upon the subject’s reasonable expectation of privacy and therefore constitutes a Fourth Amendment search. In re Application of United States for an Order Authorizing Disclosure of Location Info. of a Specified Wireless Tel., 849 F. Supp. 2d 526, 540 (D. Md. 2011) (emphasis added). It would be impractical to fashion a rule prohibiting a warrantless search only retrospectively based on the fact that the search resulted in locating the cell phone inside a home or some other constitutionally protected area. See, e.g., Kyllo, 533 U.S. at 38-39 (declining to adopt a Fourth Amendment standard that would only bar the use of thermal imaging to discern “intimate details” in the home because “no police officer would be able to know in advance whether his through-the-wall surveillance picks up ‘intimate’ details— and thus would be unable to know in advance whether it is constitutional.” (emphasis in original)); cf. Karo, 468 U.S. at 718 (“We are also unpersuaded by the argument that a warrant should not be required because of the difficulty in satisfying the particularity 43 requirement of the Fourth Amendment.”). Such a rule would provide neither guidance nor deterrence, and would do nothing to thwart unconstitutional intrusions. Cf. In re the Application of the United States for an Order (1) Authorizing the Use of a Pen Register and a Trap and Trace Device, 396 F. Supp. 2d 294, 323 (E.D.N.Y.2005) (“Because the government cannot demonstrate that cell site tracking could never under any circumstance implicate Fourth Amendment privacy rights, there is no reason to treat cell phone tracking differently from other forms of tracking . . . which routinely require probable cause.” (Internal quotations and citations omitted)). We determine that cell phone users have an objectively reasonable expectation that their cell phones will not be used as real-time tracking devices through the direct and active interference of law enforcement. We hold, therefore, that the use of a cell site simulator, such as Hailstorm, by the government, requires a search warrant based on probable cause and describing with particularity the object and manner of the search, unless an established exception to the warrant requirement applies. We turn to consider whether such an exception applies in this case. c. The Third Party Doctrine The State maintains that the “Third Party Doctrine” exception to the warrant requirement applied to the BPD’s use of Hailstorm to track down Andrews’s cell phone. The doctrine—providing that an individual forfeits his or her expectation of privacy in information that is turned over to a third party—finds its strongest expression in United States v. Miller, 425 U.S. 435 (1976) and Smith v. Maryland, 442 U.S. 735 (1979). 44 In Smith v. Maryland, the Supreme Court was presented with the issues of whether the warrantless installation and use of a pen register to collect the telephone numbers dialed from a telephone at the petitioner’s home constituted a “search” within the meaning of the Fourth Amendment. 442 U.S. at 736-37. The Court described the function of pen registers, stating that they “‘disclose only the telephone numbers that have been dialed—a means of establishing communication. Neither the purpose of any communication between the caller and the recipient of the call, their identities, nor whether the call was even completed is disclosed by pen registers.’” Id. at 741 (quoting United States v. New York Tel. Co., 434 U.S. 159, 167 (1977)). Accordingly, the Court narrowed the issue before it, stating: Given a pen register’s limited capabilities, therefore, petitioner’s argument that its installation and use constituted a “search” necessarily rests upon a claim that he had a “legitimate expectation of privacy” regarding the numbers he dialed on his phone. Id. at 742. In United States v. Miller, the Supreme Court held that no reasonable expectation of privacy existed once the owner of financial checks turned financial instruments over to a bank and “exposed [them] to [bank] employees in the ordinary course of business.” 425 U.S. at 442. The State argues that the cell site simulator used in this case merely “detects the signal emitted by the cell phone, just as a regular cell tower would[,]” and, therefore, “the police used data that Andrews voluntarily shared with third parties—specifically his cell phone provider—to locate his phone.” The State maintains that, under Smith no Fourth Amendment “search” occurred because Andrews had no reasonable expectation of privacy in information he voluntarily transmitted to a third party. The State contends that, by 45 carrying and using a cell phone that regularly communicates with nearby cell towers, Andrews assumed the risk that the information transmitted to the cell towers would be revealed to the police. According to Andrews, the third-party doctrine of Smith v. Maryland, is inapplicable because “a cell phone user takes no conscious, voluntary action to constantly share location information with a third party.” Andrews maintains that the Supreme Court in Smith reached its conclusion using a specific line of reasoning, recognizing that “telephone subscribers ‘realize’ that they send dialed numbers to the telephone company” and by virtue of those numbers appearing on their monthly bills “subscribers ‘realize’ that the dialed numbers are recorded by the telephone company.” Andrews contends that the same cannot be said in the instant case. As Andrews points out, the Court in Smith focused on the actual knowledge attributed to telephone users and stated: All telephone users realize that they must “convey” phone numbers to the telephone company, since it is through telephone company switching equipment that their calls are completed. All subscribers realize, moreover, that the phone company has facilities for making permanent records of the numbers they dial, for they see a list of their long-distance (toll) calls on their monthly bills. Id. at 742. In that context, the court determined that because the “petitioner voluntarily conveyed to [the telephone company] information that it had facilities for recording and that it was free to record[,] . . . petitioner assumed the risk that the information would be divulged to police.” Id. at 745. Although the Supreme Court’s decision in Smith has been applied broadly, see, e.g., United States v. Bynum, 604 F.3d 161, 162-64 (4th Cir. 2010) (upholding the government’s 46 use of a subpoena to obtain a website user’s name, email address, telephone number, and physical address—all information that the user entered on the website when he opened his account—from a website operator), it remains that a party must voluntarily convey information to a third-party, before there is no longer a reasonable expectation of privacy in that information. Cf. Jones, 132 S. Ct. at 957 (Sotomayor, J., concurring) (“This approach [in Smith] is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. . . . I would not assume that all information voluntarily disclosed to some member of the public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment protection.” (citation omitted)). Recently, in United States v. Graham, supra, the Fourth Circuit addressed the application of the third-party doctrine to CSLI and stated: [The precedents] simply hold that a person can claim no legitimate expectation of privacy in information she voluntarily conveys to a third party. It is that voluntary conveyance—not the mere fact that the information winds up in the third party’s records—that demonstrates an assumption of risk of disclosure and therefore the lack of any reasonable expectation of privacy. We decline to apply the third-party doctrine in the present case because a cell phone user does not “convey” CSLI to her service provider at all— voluntarily or otherwise—and therefore does not assume any risk of disclosure to law enforcement. 796 F.3d at 354 (footnote omitted). We agree, once again, with the Graham court and join in the view shared by other courts that, “[t]he fiction that the vast majority of the American population consents to warrantless government access to the records of a significant share of their movements by ‘choosing’ to carry a cell phone must be rejected.” Graham, 796 F.3d at 355-56 (quoting In re United States for an Order Authorizing the Release of Historical Cell-Site Info., 809 47 F. Supp. 2d 113, 127 (E.D.N.Y. 2011)). Cell phone users do not actively submit their location information to their service provider. In the present case, there was no affirmative act like “dialing.” This is made abundantly clear by Det. Haley’s testimony stating that “if they’re on the phone, then they’re already connected to . . . the [] network[, a]nd we’re not going to be able to pull them off of that until . . . they hang up the call.” Det. Haley’s testimony reveals that, in the event that an individual is actively using the cell phone to knowingly transmit signals to nearby cell towers, the cell site simulator will not be able to access the phone. The pin-point location information that led to finding Andrews was obtained directly by law enforcement officers and not through a third-party. It is not the case that Andrews’s cell phone transmitted information to the service provider that was then recorded and shared with law enforcement. Thus, it cannot be said that Andrews “assumed the risk” that the information obtained through the use of the Hailstorm device would be shared by the service provider as in Smith. The function of the Hailstorm device foreclosed that possibility. When asked “how do you get information about where the phone is on the [Hailstorm] machine,” Det. Haley responded: “[W]hen [Hailstorm] captures that identifier that you put into the machine or the equipment, it then tells you . . . where the signal’s coming from[.]” Under the facts of this case, the ultimate location data relied on by the police was never transmitted to a third party voluntarily by Andrews. Because there was no third-party element to the use of the Hailstorm by the BPD to locate Andrews, Smith is inapposite. We conclude the Third Party Doctrine does not apply in this case. 48 II. Standing One of the State’s primary arguments on appeal is that Andrews lacks standing to challenge the search of 5032 Clifton Avenue. The State argues that once it challenged Andrews’s standing to protest the search of 5032 Clifton Avenue, the burden was on Andrews to put on evidence during the suppression hearing to establish Andrews’s “basis for claiming he had a reasonable expectation of privacy in the contents of someone else’s home.” The State posits the suppression court erred in “finding that there was no need to prove standing.” Certainly, “[t]he burden is on the defendant to show standing; it is not on the State to show non-standing.” State v. Savage, 170 Md. App. 149, 177 (2006). In Savage, however, this Court clarified that standing “[i]s exclusively a threshold question of applicability, concerned only with the coverage by the Fourth Amendment of the defendant who seeks to raise a Fourth Amendment challenge.” Id. at 174. Thus, the burden on a proponent of a motion to suppress is to establish “that his own Fourth Amendment rights were violated by the challenged search or seizure.” Id. at 175 (emphasis in Savage) (quoting Rakas v. Illinois, 439 U.S. 128, 130 n.1 (1978)). Andrews points out that the State “failed to respond in any meaningful way” to his motion to suppress, and did not raise the issue of standing to challenge the search of 5032 Clifton Avenue until well into the June 4, 2015 suppression hearing. Andrews asserts that it was the State’s suggestion that the parties stipulate that the issues before the court be decided based on the transcripts, the arrest warrant, the pen register\trap & trace 49 application, and the search warrant. Andrews contends the State did not raise the standing issue until after the fact-finding portion of the hearing had concluded. At that time, the court requested that Andrews address the issue, and defense counsel made a proffer that Andrews was an overnight guest at 5032 Clifton Avenue and offered to put him on the stand to provide supporting testimony.18 Andrews argues that the State waived any argument regarding standing, pointing to the State’s delay, its failure to challenge his proffer, and its concession that its trial theory was the fact “that [Andrews] has some interest [in 5032 Clifton Avenue] and that is why the gun from this crime, the murder weapon, was there with him.” We need not pursue the nuances of the parties’ “standing” argument as they have framed the issue. We have already determined that Andrews had a reasonable expectation of privacy in his aggregate and real-time location information (CLSI) contained in his cell phone. See Rakas, 439 U.S. at 139-140 (stating that “the better analysis forthrightly focuses on the extent of a particular defendant’s rights under the Fourth Amendment, rather than on any theoretically separate, but invariably intertwined concept of standing[,]” and 18 It is plain that an overnight guest has a legitimate expectation of privacy in his host’s home and “may claim the protection of the Fourth Amendment.” Carter, supra, 525 U.S. at 90; Savage, 170 Md. App. at 188-89. As Andrews points out, defense counsel made a proffer that Andrews was an overnight guest and offered to put testimony to that effect on the record. The State has not seriously challenged Andrews’s connection to the residence, but seeks merely to assert that his unopposed proffer was not sufficient to rebut their late challenge. We observe that—after the State sought to rely on earlier transcripts to provide necessary testimony, failed to challenge standing during the evidentiary portion of the suppression hearing, and left uncontroverted Andrews’s proffer that he was an overnight guest—Andrews’s proffer under the circumstances may have been sufficient to counter the State’s standing argument. 50 “[t]hat inquiry in turn requires a determination of whether the disputed search and seizure has infringed an interest of the defendant which the Fourth Amendment was designed to protect.”). The search warrant search for 5032 Clifton Avenue was based solely on constitutionally tainted information. As the suppression court explained, “I reviewed the warrant and it literally says the Defendant was in there so now we need a warrant. And information generated from the use of the Hailstorm [is to] be suppressed, that’s all that it is.” Because the Fourth Amendment violation of Andrews’s privacy in his real-time CSLI provided the only nexus to 5032 Clifton Avenue, Andrews was entitled to challenge that search. See Wong Sun v. United States, 371 U.S. 471, 487-88 (1963) (stating that, in determining whether evidence is fruit of the poisonous tree, “the more apt question in such a case is whether, granting establishment of the primary illegality, the evidence to which instant objection is made has been come at by exploitation of that illegality or instead by means sufficiently distinguishable to be purged of the primary taint.” (citation and internal quotation marks omitted)). For the foregoing reasons, Andrews had standing to challenge the “search” of 5032 Clifton Avenue. III. The Warrant Requirement Having determined that the government’s use of a cell site simulator to obtain location information directly from an individual’s cell phone is a “search” under the Fourth Amendment, and, therefore, requires a warrant based on probable cause, we now examine the state’s reliance on the pen register\trap & trace order issued by the circuit court. First, we examine whether the Maryland pen register statute authorized the use of a cell site 51 simulator. Second, we examine whether the putative pen register\trap & trace order in this case operated as the equivalent of a warrant as the State contends. a. The Maryland Pen Register Statute Does Not Authorize the Use of Cell Site Simulators Such as Hailstorm The function of the Hailstorm device, as illuminated by testimony before the suppression court, places it outside the statutory framework of the Maryland pen register statute. The statute authorizes the use of the following surveillance methods defined in CJP §10-4B-0.1: Pen register (c)(1) “Pen register” means a device or process that records and decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted. (2) “Pen register” does not include any device or process used: (i) By a provider or customer of a wire or electronic communication service for billing, or recording as an incident to billing, for communications services provided by the provider or any device used by a provider or customer of a wire communication service for cost accounting or other similar purposes in the ordinary course of its business; or (ii) To obtain the content of a communication. Trap and trace device (d)(1) “Trap and trace device” means a device or process that captures the incoming electronic or other impulses that identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication. (2) “Trap and trace device” does not include a device or process used to obtain the content of a communication. Wire communication, electronic communication, and electronic communication service (e) “Wire communication”, “electronic communication”, and “electronic communication service” have the meanings stated in § 10-401 of this title. 52 The statute specifies that any order issued must identify, if known, “the person to whom is leased or in whose name is listed the telephone line or other facility to which the pen register or trap and trace device is to be attached or applied.” CJP § 10-4B04(b)(1) (emphasis added). Construing the plain language of CJP § 10-4B-01, we determine that it does not, on its face, apply to the use of cell site simulators. A “pen register” is “a device or process that records . . . signaling information transmitted by an instrument . . . from which a wire or electronic communication is transmitted.” CJP § 10-4B-01(c)(1) (emphasis added). As discussed above, the Hailstorm device does not passively intercept an electronic communication that has been transmitted. Rather, it initiates contact with a cell phone and traces the signal received in response. A “trap and trace device” is a “device or process that captures the incoming electronic or other impulses that identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication.” CJP § 10-4B-01(d)(1) (emphasis added). The function of the Hailstorm device—to shower an electronic barrage of signals into a target area to actively engage the target cell phone—goes well beyond the bounds of the pen register statute which by its terms is limited to authorizing devices that record or identify the source of a communication or capture an originating number. The Maryland pen register statute has been examined in only one reported opinion by a Maryland appellate court.19 See Chan v. State, 78 Md. App. 287, 293 (1989) In the federal district court in United States v. Wilford, a defendant more recently argued that cell phone pinging was not authorized by Maryland’s pen register statute. 961 19 53 (upholding the use of a trap and trace device pursuant to a court order to obtain data from over 5,000 calls over an eighty-day period). In Chan, although this Court determined that the newly enacted Maryland pen register statute was not applicable because it did not take effect until July 1, 1988, it stated that the new statute “unquestionably cover[ed]” the “trap and trace” of incoming calls and observed: In response to the Electronic Communications Privacy Act of 1986 passed by the Federal Congress, the Maryland General Assembly moved for the first time to regulate “pen registers” and “trap and trace” devices by Chapter 607 of the Acts of 1988. The new regulation is not part of the “Wiretapping and Electronic Surveillance” subtitle but is a separate subtitle of its own, 4B, dealing with the distinct subject matter of “Pen Registers and Trap and Trace Devices.” Its provisions and its wording are virtually verbatim with those of its Federal counterpart. Id. at 308 (emphasis added). In 2001, Congress amended the definition of the term “pen register” in the federal counterpart as part of the USA PATRIOT Act. See PL 107–56, October 26, 2001, 115 Stat 272. Subsequently, in 2002, the Maryland pen register statute was also amended to the current versions, reproduced above. 2002 Md. Laws, ch. 100 (H.B. 1036). Notably, since F. Supp. 2d 740, 768 (D. Md. 2013), on reconsideration in part (Nov. 27, 2013). In that case, the defendant maintained that the statutory language “is limited to providing law enforcement numbers that dialed into the target phone and numbers dialed out,” but does “not contemplate” the use of a cell phone as a “physical locator/tracking device.” Id. at 769. The district court noted that “[n]o judicial decision offers any guidance as to the scope of the Maryland statute with respect to pinging.” Id. However, rather than address whether the collection of CSLI was authorized by the pen register statute, the district court accepted that contention arguendo and, instead, based its holding on the unavailability of suppression as a remedy for violation of the statute. Id. at 770. 54 Chan was decided in 1989, the wording of the Maryland statute remains virtually verbatim with its federal counterpart. See 18 U.S.C. § 3127; 18 U.S.C. § 2510. Looking then, at the federal statutory scheme, we note that the federal Communications Assistance for Law Enforcement Act (“CALEA”), which delineates a telecommunications carrier’s duty to cooperate in the interception of communications for law enforcement purposes, provides that “with regard to information acquired solely pursuant to the authority for pen registers and trap and trace devices (as defined in section 3127 of Title 18), such call-identifying information shall not include any information that may disclose the physical location of the subscriber (except to the extent that the location may be determined from the telephone number).” 47 U.S.C. § 1002 (2015) (emphasis added). Thus, federal law specifies that the federal equivalent to the Maryland pen register statute does not authorize location information. Rather, the federal scheme allows the government to use a mobile tracking device through warrant or other order as contemplated in 18 U.S.C. § 3117 and Federal Rule of Criminal Procedure 41. Although there are no reported opinions that address whether the collection of realtime cell site location information (CSLI) is authorized under the Maryland’s pen register statute, numerous federal courts construing the virtually identical federal statutes have found no statutory authorization for obtaining such information without demonstrating probable cause. In 2005, the United States District Court for the Southern District of Texas held that the government must demonstrate probable cause and obtain a search warrant to obtain real-time CSLI. In re Application for Pen Register & Trap/Trace Device with Cell 55 Site Location Auth., 396 F. Supp. 2d 747, 759 (S.D. Tex. 2005). Construing the federal statutes, the district court stated: Tracking device information such as cell site data is plainly not a form of electronic communication at all. *** This type of surveillance is unquestionably available upon a traditional probable cause showing under Rule 41 [for a mobile tracking device]. On the other hand, permitting surreptitious conversion of a cell phone into a tracking device without probable cause raises serious Fourth Amendment concerns, especially when the phone is monitored in the home or other places where privacy is reasonably expected. Id. at 759, 765. See also In re Application of the United States for an Order Authorizing Installation & Use of a Pen Register, 415 F. Supp. 2d 211, 219 (W.D.N.Y. 2006) (holding that the government was not entitled to real-time CSLI by statute and thus, was required to make a “showing that there exists probable cause to believe that the data sought will yield evidence of a crime.”). Directly addressing the use of a cell site simulator (such as Stingray or Hailstorm) to obtain real-time CSLI for tracking purposes, the District Court for the Southern District of Texas determined that, rather than merely capturing signaling information as contemplated in the federal pen register statute, the use of a cell site simulator constituted a mobile tracking device. In re the Application of the United Sates. for an Order Authorizing the Installation & Use of a Pen Register & Trap & Trace Device, 890 F. Supp. 2d 747, 752 (S.D. Tex. 2012). We acknowledge that law enforcement has long relied on pen register\trap & trace orders for valid and vital investigative purposes. They will continue to do so. The pen register statute, however, is limited by its terms and is not intended to apply to other, newer 56 technologies. Thus we hold that a pen register\trap & trace order is not sufficient to authorize use of the Hailstorm.20 Criminal Procedure § 1-203.1 Although at the time Andrews was arrested Maryland did not have a corollary to the provision in Federal Rule of Criminal Procedure 41 that specifically authorizes issuance of a warrant for a mobile tracking device, Maryland has since enacted a statute authorizing law enforcement to obtain real-time CSLI, effective October 1, 2015. Maryland Code (2001, 2008 Repl. Vol., 2015 Supp.) Criminal Procedure Article (“CP”) § 1-203.1. The statute provides that a court may issue an order allowing an officer to obtain real-time location information from an electronic device based on probable cause that: (i) a misdemeanor or felony has been, is being, or will be committed by the owner or user of the electronic device or by the individual about whom location information is being sought; and (ii) the location information being sought: 1. is evidence of, or will lead to evidence of, the misdemeanor or felony being investigated; or 20 Federal law enforcement agencies have recognized that they need to obtain warrants rather than rely on less rigorous legal authorizations before utilizing cell site simulators. On September 3, 2015, the United States Justice Department of Justice announced a new policy setting forth required practices with respect to the treatment of information collected through the use of cell site simulators and stated: While the department has, in the past, obtained appropriate legal authorizations to use cell-site simulators, law enforcement agents must now obtain a search warrant supported by probable cause before using a cell-site simulator. Justice News, Justice Department Announces Enhanced Policy for Use of Cell-Site Simulators, DOJ 15-1084 (2015) (emphasis added). 57 2. will lead to the apprehension of an individual for whom an arrest warrant has been previously issued. CP § 1-203.1(b)(1). The Fiscal and Policy Note prepared by the Department of Legislative Services for the General Assembly concerning this statute when it was first proposed, recognized that law enforcement officers were using the Maryland pen register statute to obtain cell phone-related information. It explained that the proposed statute would specifically authorize the capture of CSLI in accord with several recent federal court decisions finding that probable cause was needed to obtain such information. Fiscal and Policy Note (Revised), Senate Bill 698, Criminal Procedure – Electronic Device Location Information – Order (2014). The fiscal and policy note also contemplated the use of cell site simulators and stated: While cell phone records are usually obtained from a cell phone provider, technology is making it possible for law enforcement to bypass these companies altogether. Certain devices allow law enforcement to obtain location data by imitating a cell phone tower, getting a phone to connect with it, and measuring signals from the phone to pinpoint its location. The device, which is being used by the Federal Bureau of Investigation, the military, and local law enforcement, is known by several trade names, including StingRay, KingFish, and LoggerHead. Notably, CP § 1-203.1 contains safeguards and limitations not found in the Maryland pen register statute, including a thirty-day durational limit on the collection of location information unless an extension is sought on continuing probable cause, and a provision requiring notice to the user or owner of the monitored device within 10 days absent a showing of good cause to delay. CP § 1-203.1(c) & (d). The parties have briefed extensively their view of the meaning and application of CP 1-203.1. Other than to provide context for the history of the Maryland pen register 58 statute and our conclusion that it was not intended to cover cell site simulators, we do not address the application of CP 1-203.1 and decline to opine as to whether an order under CP 1-203.1 will suffice to satisfy the requirements of a warrant based on probable cause. In sum, we conclude that the purpose of Maryland’s pen register statute is to capture information resulting from two-way, electronic or wire communications. Nothing in the plain language of CJP § 10-4B-01 et seq. suggests that it was ever intended to allow surveillance technology that can exploit the manner in which a cell phone transmits data to convert it into a mobile tracking device. Accordingly, an order issued pursuant to CJP § 10-4B-04 cannot authorize the use of a cell site simulator, such as Hailstorm. Because there was no statutory authorization for the BPD’s use of the Hailstorm cell site simulator, we hold that the BPD should have sought a warrant or a specialized order upon a particularized showing of probable cause, and based on sufficient information about the technology involved to permit the court to contour reasonable limitations on the scope and manner of the BPD’s use of the device.21 See, e.g., In re Application of the United States for an Order Authorizing Installation & Use of a Pen Register, 415 F. Supp. 2d at 219. b. The Order Obtained by the State Was Not Equivalent to a Warrant The State insists that its use of the Hailstorm device to track Andrews’s cell phone was authorized by the court order. In the absence of a specific statute that would have 21 To the extent that the State makes a limited argument that there is no suppression remedy available for violation of the sections 10-4B-01 et seq., we respond simply that the circuit court found, and we agree, that the use of the cell site simulator was a Fourth Amendment violation and, thereby, the exclusionary rule applies. The fact that there may have been a contemporaneous violation of sections 10-4B-01 et seq. does not limit the available remedy. 59 authorized the use of a cell site simulator at the time Andrews was arrested, the State presses that “the police erred on the side of caution and obtained a court order specifically authorizing the use of a cellular tracking device to find Andrews’s phone[,]” pursuant to the “nearest analog”—the Maryland pen register statute. The State acknowledges that the court order described in the Maryland pen register statute does not use the words “warrant” or “probable cause.” Nevertheless, the State argues that, in this case, the BPD’s application and the resulting order “went far beyond the requirements of the statute.” The State points out that the BPD application was for an order allowing the police to employ surreptitious or duplication of facilities, technical devices or equipment to accomplish the installation and use of a Pen Register\Trap & Trace and Cellular Tracking Device [. . .] and shall initiate a signal to determine the location of the subject’s mobile device on the service provider’s network or with such other reference points as may be reasonabl[y] available . . . The State also notes that the resultant order states that probable cause exists to authorize the use of a “Cellular Tracking Device.” Thus, the State contends that because the pen register\trap & trace order stated that it was based upon a finding of probable cause, it was, therefore, “the functional equivalent of a warrant.” Andrews emphasizes that the order may issue on just a showing “that the information likely to be obtained by the installation and use is relevant to an ongoing criminal investigation.” CJP § 10-4B-04(a)(1). In addition to the fact that a pen register\trap & trace order does not contemplate the use of a cell site simulator, Andrews points out that it also does not satisfy the requirements that a warrant based on probable cause be attached to a specific suspected crime, be confined in scope, or describe with 60 particularity the place to be searched or the person to be seized. Andrews contends that “[t]he moment BPD conducted surveillance with something other than a pen register, it exceeded the purview of the pen register order.” Further, Andrews contends that BPD’s application “For an Order Authorizing the Installation and Use of a Device Known as a Pen Register/Trap & Trace,” was intentionally captioned to ensure that the circuit court scrutinized it according to the statutory pen register factors. Andrews argues that BPD’s “disingenuous efforts” hid from the circuit court “the scope, intensity, [and] nature of the search,” and prevented the court from conducting a proper probable cause analysis. We begin with our appraisal that an order issued under the pen register statute is not the equivalent of a warrant based on probable cause—a fact the State implicitly concedes in its argument that it “went beyond the requirement of the statute.” The applicable requirements of the statute are contained first in § 10-4B-03: (b) Contents. — An application under subsection (a) of this section shall include: (1) The identity of the State law enforcement or investigative officer making the application and the identity of the law enforcement agency conducting the investigation; and (2) A statement under oath by the applicant that the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency. Additionally, 10-4B-04(a) states that an order may issue if the court finds the information likely to be obtained by the device is relevant to an ongoing criminal investigation, and the order must: (3) Specify the attributes of the communications to which the order applies, including the number or other identifier and, if known, the location of the telephone line or other facility to which the pen register or trap and trace 61 device is to be attached or applied, and, in the case of a trap and trace device, the geographic limits of the trap and trace order; (4) Contain a description of the offense to which the information likely to be obtained by the pen register or trap and trace device relates[.] CJP § 10-4B-04(b)(3) & (4). Plainly, this limited showing falls short of the particularity required for the issuance of a search warrant. See Illinois v. Gates, 462 U.S. 213, 238 (1983) (“The task of the issuing magistrate is simply to make a practical, common-sense decision whether . . . there is a fair probability that contraband or evidence of a crime will be found in a particular place.”); Nero v. State, 144 Md. App. 333, 345-46 (2002) (“General warrants, of course, are prohibited by the Fourth Amendment. . . . [T]he problem [posed by the general warrant] is not that of intrusion per se, but of a general, exploratory rummaging in a person’s belongings. . . . [The Fourth Amendment addresses the problem] by requiring a ‘particular description’ of the things to be seized.” (quoting Andresen v. Maryland, 427 U.S. 463, 480 (1976))). Moving to the State’s argument that the order was sufficient because it went beyond the requirements of the statute, we start by rejecting the State’s contention that the words “probable cause” contained in the pen register application and order converted the overreaching order into a warrant. The “probable cause” articulated in the resulting order is merely that “information likely to be obtained . . . is relevant to an ongoing criminal investigation.” (Emphasis in original). Certainly, while this reflects the standard required for issuance of an order under CJP § 10-4B-04, it falls far short of the particularity required to support a search warrant. See Gates, 462 U.S. at 238; Nero, 144 Md. App. at 345-46. In the information “offered in support of probable cause” the application states: 62 Your Applicant hereby certifies that the information likely to be obtained concerning [Andrews’s] location will be obtained by learning the numbers, locations and subscribers of the telephone number(s) being dialed or pulsed from or to the aforesaid telephone and that such information is relevant to the ongoing criminal investigation. Plainly, the State’s use of the Hailstorm device extended far beyond this certification as to how information concerning Andrews’s location would be obtained. Here, the State inserted language into its application and proposed order attempting to, without being specific, obtain court authorization for more than a pen register\trap & trace order. Although the application does request authorization to use a “Cellular Tracking Device,” it fails to name or describe any cell site simulator. In fact, there is absolutely nothing in the application or order that identifies the Hailstorm device, or provides even a rudimentary description of cell site simulator technology. The application also failed to identify any geographical limitation to the BPD’s use of the undisclosed surveillance technology, and did not explain what was to be done with the information collected. Nor did the application disclose the possibility that the technology employed may capture the cell phone information (unique serial numbers) of innocent third parties in range of the target area. Finally, we are troubled that the application for a pen register\trap & trace order did not fully apprise the circuit court judge from whom it was sought of the information that it would yield. Based on the application that he received, the circuit judge was entitled to expect that the results would be a list of telephone numbers that Andrews called and that called Andrews—not a real-time fix on his location. We determine that the pen register\trap & trace order in this case failed to meet the requirements of a warrant. To allow the government to collect real-time location 63 information on an unknown number of private cell phones, without any geographic boundaries, without any reporting requirements or requirements that any unrelated data be deleted, and without a showing of probable cause that contraband or evidence of a particular crime will be found through the particular manner in which the search is conducted would certainly run afoul of the Fourth Amendment. As stated in our holding above, unless a valid exception to the warrant requirement applies,22 the government may not use a cell phone simulator without a warrant or, alternatively, a specialized order that requires a particularized showing of probable cause, based on sufficient information about the technology involved to allow a court to contour reasonable limitations on the scope and manner of the search, and that provides adequate protections in case any third-party cell phone information might be unintentionally intercepted. To hold otherwise would be to 22 One of the exceptions more commonly relied upon applies when ‘the exigencies of the situation make the needs of law enforcement so compelling that [a] warrantless search is objectively reasonable under the Fourth Amendment.’” Kentucky v. King, 563 U.S. 452, 460 (2011) (some internal quotation marks omitted) (quoting Mincey v. Arizona, 437 U.S. 385, 394 (1978)). Maryland has recognized that “[e]xigent circumstances exist when a substantial risk of harm to the law enforcement officials involved, to the law enforcement process itself, or to others would arise if the police were to delay until a warrant could be issued.” Williams v. State, 372 Md. 386, 402 (2002) (citations omitted). It remains the State’s burden to establish exigent circumstances sufficient to justify a warrantless search. Wengert v. State, 364 Md. 76, 85 (2001) (citations omitted). We note that the Supreme Court in Riley, supra, rejected the argument that officer safety, in that case, presented an exigent circumstance that justified officer’s accessing content on a cell phone seized in a search incident to arrest. The Court observed that “[t]o the extent dangers to arresting officers may be implicated in a particular way in a particular case, they are better addressed through consideration of case-specific exceptions to the warrant requirement, such as the one for exigent circumstances.” 134 S. Ct. at 2486. 64 abandon the Fourth Amendment by assuming, without any foundation, that the citizens of Maryland have forfeited their reasonable expectation of privacy in their personal location. IV. The Exclusionary Rule a. The Search Warrant Does Not Survive Removal of the Constitutionally Tainted Information. The State contends that the search warrant that was obtained for 5032 Clifton Avenue was valid because probable cause existed once “Andrews was found in the home.” According to the State, Andrews was arrested pursuant to a valid arrest warrant and the police had “the consent of the apparent owner of the home to enter the home to take Andrews into custody.” Thus, the State argues, “[n]othing about the way in which Andrews was located negated the probable cause to believe that there could be evidence of the crimes at that address.” In riposte, Andrews avers that without the location data provided by the cell site simulator, “the BPD possessed no nexus between the criminal activity at hand and 5032 Clifton Avenue.” Andrews asserts that, “[b]ecause the search warrant relied entirely on that nexus, it withers as fruit of the poisonous tree.” First, we note that where entry into a protected space “was demanded under color of office” and “granted in submission to authority,” that submission does not equate to a waiver of a constitutional right. Johnson, supra, 333 U.S. at 13 (citing Amos v. United States, 255 U.S. 313 (1921). Thus, the existence of an arrest warrant and the consent of 65 the owner of the residence do not, in themselves, diminish Andrews’s protection under the Fourth Amendment. Nor do they render the later-acquired search warrant unassailable. Second, the courts of Maryland have recognized that where a search warrant relies on information obtained in violation of the constitution, the question is “whether ‘after the constitutionally tainted information is excised from the warrant, the remaining information is sufficient to support a finding of probable cause.’” Redmond v. State, 213 Md. App. 163, 191-92 (2013) (quoting Williams v. State, 372 Md. 386, 419 (2002)). See also Karo, 468 U.S. at 720-21 (stating that in determining whether evidence seized pursuant to a contested warrant remains admissible, one of the pertinent questions is whether “the warrant affidavit, after striking the [constitutionally tainted] facts . . . contained sufficient untainted information to furnish probable cause for the issuance of the search warrant.”) Here, there can be no doubt that the only information linking Andrews and 5023 Clifton Avenue was the fruit of the Fourth Amendment violation. The State presents no credible argument that evidence of Andrew’s presence in the home was obtained by independent lawful means. In Redmond v. State, the BPD were investigating an armed robbery in which a cell phone was stolen. 213 Md. App. at 169. During their investigation, detectives contacted the victim’s mobile service provider and, “by triangulating the signal from cell phone towers in the area, determined that the stolen cell phone was in the proximity of 3303 Round Road.” Id. at 169. Thereafter, detectives began moving from house to house in the area, speaking to residents using a ruse that they were “looking for a pedophile named ‘Leroy Smalls.’” Id. at 170. After obtaining consent to enter the appellant’s residence 66 under those false pretenses, one of the detectives surreptitiously dialed the number of the stolen cell phone, heard it ringing upstairs, and then walked through the entire house conducting a “protective sweep” including opening closet doors and checking under beds. Id. at 171. Officers then sought a search warrant for the home on the basis of what they had discovered in the home. Id. at 171-72. After a careful analysis, we determined that “[b]y dialing the number of the stolen cell phone and walking upstairs to locate it, the police exceeded the scope of any consent that was given to their presence inside 3303 Round Road.” Id. at 189-90. Applying the exclusionary rule, we noted that “all the information . . . attested to in applying for the search warrant (and on which the search warrant was granted) . . . was discovered during the initial illegal entry.” Id. at 192. We determined that the search warrant was not issued based on an independent lawful source and the unlawfully obtained evidence should be suppressed.23 Id. And, we soundly rejected the argument that evidence in a warrant Although the warrant application in Redmond mentioned reliance on “sophisticated mobile and/or portable surveillance equipment” to locate the stolen cell phone, in that case we observed that: 23 Detective Jendrek did not testify that the ATT used any “sophisticated mobile and/or portable surveillance equipment” while in the 3300 block of Round Road. Rather, his testimony was that the ATT detectives confirmed the precise location of the cell phone by use of ordinary police investigatory tactics: speaking to the occupants of two houses, dialing the number of the stolen cell phone, listening for it to ring, and, ultimately, physically observing the stolen cell phone lying on a dresser. Thus, to the extent that the averments in the search warrant application represent that the ATT detectives used “sophisticated” means to locate the 67 application was obtained by independent lawful means “(1) where the officer’s decision to seek the warrant was prompted by what they had seen during the initial entry; and (2) where information obtained during that entry was presented to the [judge] and affected his [or her] decision to issue the warrant.” Id. at 191 (internal quotation marks omitted) (alterations in Redmond) (quoting Kamara v. State, 205 Md. App. 607, 627-28 (2012). See also Murray v. United States, 487 U.S. 533, 534 (1988) (“The ultimate question is whether the search pursuant to warrant was in fact a genuinely independent source of the information and tangible evidence at issue. This would not have been the case if the agents’ decision to seek the warrant was prompted by what they had seen during the initial entry or if information obtained during that entry was presented to the Magistrate and affected his decision to issue the warrant.”). As in Redmond, here, the evidence that forms the only basis for probable cause in the State’s search warrant application—that Andrews was at 5032 Clifton Avenue—was that obtained through an unlawful search—in this case, the BPD’s use of the Hailstorm device. We agree with the circuit court’s determination that there was no independent lawful source to establish a nexus between Andrews and the residence. Cf. Agurs v. State, 415 Md. 62, 84 (2010) (stating that “police should have been aware that there must be a stolen cell phone while at the scene on the afternoon of March 2, 2010, they are simply inaccurate. 213 Md. App. at 193. The defendant in Redmond did not challenge the use of any such device or the use of cell tower information. Accordingly, in Redmond we did not address the use of sophisticated mobile surveillance systems, as we must in the matter sub judice. 68 nexus between criminal activity and the place to be searched.”). Accordingly, once the constitutional taint is removed from the search warrant in this case, what remains is insufficient to establish probable cause for a search of 5032 Clifton Avenue and, as discussed further infra, the evidence seized in that search withers as the fruit of the poisoned tree. Franks v. Delaware, 438 U.S. 154, 156 (1978) (stating that if “the affidavit’s remaining content is insufficient to establish probable cause, the search warrant must be voided and the fruits of the search excluded to the same extent as if probable cause was lacking on the face of the affidavit.”). Therefore, we affirm the suppression court’s exclusion of all evidence found at 5032 Clifton Avenue. b. The State Cannot Rely on the Good Faith Exception Finally, the State argues that BPD’s relied in good faith on the search warrant issued for 5032 Clifton Avenue after locating Andrews inside that address. The State asserts that police officers relied on, first, the pen register\trap & trace order, and, second, on the later issued search warrant for the premises. The State maintains that “[t]his is good faith squared[,]” and there is “simply no officer misconduct to deter in this case.” Thus, the State contends that the exclusionary rule should not apply in this case. Andrews contends that without the location information provided by the cell site simulator the BPD possessed no nexus between him and 5032 Clifton Avenue, and, “[b]ecause the search warrant relied entirely on that nexus, it withers as the fruit of the poisonous tree.” Andrews asserts that where the information relied on to obtain a warrant is the product of a Fourth amendment violation, the fruit of the poisonous tree doctrine 69 trumps the good faith exception. Moreover, Andrews argues that good faith cannot apply where “law enforcement officers, from the outset, dealt dishonestly with the judiciary.” In United States v. Leon, the Supreme Court held that, where officers have acted in good faith pursuant to a warrant that was later discovered to be invalid, exclusion is not warranted to deter police over-reach or misconduct. 468 U.S. 897, 924 (1984). The Supreme Court cautioned, however, that [t]he good-faith exception for searches conducted pursuant to warrants is not intended to signal our unwillingness strictly to enforce the requirements of the Fourth Amendment, and we do not believe that it will have this effect. As we have already suggested, the good-faith exception, turning as it does on objective reasonableness, should not be difficult to apply in practice. When officers have acted pursuant to a warrant, the prosecution should ordinarily be able to establish objective good faith without a substantial expenditure of judicial time. In Fitzgerald v. State, this Court aptly summarized the “good faith” exception: Because the only purpose of the Exclusionary Rule of Mapp v. Ohio, 367 U.S. 643, 81 S.Ct. 1684, 6 L.Ed.2d 1081 (1961), is to deter unreasonable police behavior, Leon and [Massachusetts v. Sheppard, 468 U.S. 981 (1984)] held that a mistake made by a judge in issuing a warrant should not be attributed to the police officer who executes it. Because the officer has been reasonable in relying on the judge’s legal expertise, it would serve no deterrent purpose to exclude otherwise competent, material, and trustworthy evidence. See Connelly v. State, 322 Md. 719, 720–21, 589 A.2d 958 (1991). 153 Md. App. 601, 655-56 (2003) aff’d, 384 Md. 484 (2004). However, this Court observed that in Karo, supra, the Supreme Court instructed that, if the information obtained through a Fourth Amendment violation “proved critical to establishing probable cause for the issuance of the warrant,” it would invalidate the subsequent search warrant for the house. Id. at 656 (citing Karo, supra, 468 U.S. at 719). Accordingly, “the conclusion may readily be drawn that in the case of an antecedent Fourth Amendment violation which 70 contributes to a warrant application, the ‘fruit of the poisoned tree’ doctrine ‘trumps’ the officer’s ‘good faith’ reliance under Leon and Sheppard.” Id. Here, as we noted above, the BPD submitted an overreaching pen register\trap & trace application that failed to clearly articulate the intended use, i.e., to track Andrews’s cell phone using an active cell site simulator. The ensuing order did not support the use of the Hailstorm device, nor did it, in any way, serve as a de facto warrant for the use of the Hailstorm device. As the State’s May 15, 2015 supplemental disclosure made clear, “WATF did not have the Clifton Ave address as a possible location until ATT provided that information.” Only after receiving that information through the use of the Hailstorm device and arresting Andrews at the premises did the same BPD officers who submitted the pen register\trap & trace application then apply for a search warrant. As Andrews points out, without the antecedent Fourth Amendment violation the nexus between the residence to be searched and the alleged criminal activity could not have been established. Cf. Agurs, 415 Md. at 84 (stating that “police should have been aware that there must be a nexus between criminal activity and the place to be searched.”). In the present case, the antecedent Fourth Amendment violation was the only basis upon which the search warrant application stood, and the fruit of the poisoned tree doctrine does, indeed, trump alleged good faith reliance on the part of BPD. See Fitzgerald, 153 Md. App. at 656. The Supreme Court in Leon, was clear that “the officer’s reliance on the magistrate’s probable-cause determination and on the technical sufficiency of the warrant he issues must be objectively reasonable.” 468 U.S. at 922. See, e.g., Spence v. State, 444 Md. 1, 12-13 71 (2015) (wherein the police officer, in searching a cell phone and reading text messages during a search incident to arrest, was acting in good faith reliance on then-controlling authority in Maryland); Agurs, 415 Md. at 83 (concluding that the good faith exception did not apply where “no reasonably well-trained police officer could have relied on the warrant that authorized the search of Agurs’ home.”). We cannot say the BPD officers in this case reasonably relied on the warrant obtained through their own misleading order application and unconstitutionally intrusive conduct. To do so would allow law enforcement to insulate its own errors merely by presenting limited information to a magistrate, obtaining a warrant post-intrusion, and then re-entering the place to be searched. The good faith exception to the exclusionary rule seeks to avoid “[p]enalizing the officer for the magistrate’s error, rather than his own.” Leon, 468 U.S at 921. That is, however, not that case here. See id. at 919 (“The deterrent purpose of the exclusionary rule necessarily assumes that the police have engaged in willful, or at the very least negligent, conduct which has deprived the defendant of some right. By refusing to admit evidence gained as a result of such conduct, the courts hope to instill in those particular investigating officers, or in their future counterparts, a greater degree of care toward the rights of an accused.” (quoting United States v. Peltier, 442 U.S. 531, 539 (1975))). It is for all of these reasons that we hold that the evidence obtained in the search of 5032 Clifton Avenue is inadmissible as fruit of the poisoned tree and was properly excluded by the suppression court. 72 JUDGMENTS OF THE CIRCUIT COURT FOR BALTIMORE CITY AFFIRMED. COSTS TO BE PAID BY MAYOR AND CITY COUNCIL OF BALTIMORE. 73