Jones v. United States, 15-CF-322.

Decision Date21 September 2017
Docket NumberNo. 15-CF-322.,15-CF-322.
Citation168 A.3d 703
Parties Prince JONES, Appellant, v. UNITED STATES, Appellee.
CourtD.C. Court of Appeals

168 A.3d 703

Prince JONES, Appellant,
v.
UNITED STATES, Appellee.

No. 15-CF-322.

District of Columbia Court of Appeals.

Argued April 18, 2017
Decided September 21, 2017


Stefanie Schneider, Public Defender Service, with whom Samia Fam and Jaclyn Frankfurt, Public Defender Service, were on the brief, for appellant.

Lauren R. Bates, Assistant United States Attorney, with whom Channing D. Phillips, United States Attorney, and Elizabeth Trosman, John P. Mannarino, and Jodi S. Lazarus, Assistant United States Attorneys, were on the brief, for appellee.

Nathan Freed Wessler, American Civil Liberties Union, with whom Arthur B. Spitzer and Scott Michelman, American Civil Liberties Union, and Jennifer Lynch, Electronic Frontier Foundation, were on the brief, for American Civil Liberties Union of the Nation's Capital and Electronic Frontier Foundation, amicus curiae, in support of appellant.

Before Thompson and Beckwith, Associate Judges, and Farrell, Senior Judge.

168 A.3d 707

Opinion by Associate Judge Beckwith for the court, except as to Part II.E.3.

Opinion by Senior Judge Farrell, concurring in part and concurring in the judgment, at page 725–26.

Dissenting opinion by Associate Judge Thompson, at page 728–29.

Beckwith, Associate Judge:

A jury found appellant Prince Jones guilty of various offenses arising out of two alleged incidents of sexual assault and robbery at knifepoint.1 Mr. Jones appeals his convictions on the ground that much of the evidence offered against him at trial was the direct or indirect product of a warrantless—and thus, Mr. Jones argues, unlawful—search involving a cell-site simulator or "stingray."2 Mr. Jones presented this Fourth Amendment claim to the trial court in a pretrial motion to suppress, but the trial court denied it under the inevitable-discovery doctrine3 and did not reach the question whether the government violated Mr. Jones's rights. We agree with Mr. Jones that the government violated the Fourth Amendment when it deployed the cell-site simulator against him without first obtaining a warrant based on probable cause. Further, we reverse the trial court's inevitable-discovery ruling and reject the government's argument (not resolved by the trial court) that the good-faith doctrine4 precludes applying the exclusionary rule in this case. Because the admission at trial of the evidence obtained as a result of the unlawful search was not harmless beyond a reasonable doubt, we reverse Mr. Jones's convictions.

I. Background

A. Investigation and Arrest of Mr. Jones

At the suppression hearing in this case, Detective Rachel Pulliam, a member of the Sexual Assault Unit of the Metropolitan Police Department (MPD), testified that she investigated a sexual assault that occurred around 12:30 a.m. on October 9, 2013, and another that occurred around 1:30 a.m. on October 11. The two sexual-assault complainants were women who had advertised escort services on the classified-advertising website Backpage. Detective Pulliam testified that on each occasion, the perpetrator5 contacted the complainant by telephone in response to an advertisement

168 A.3d 708

and arranged to pay the complainant for sexual services. According to Detective Pulliam, when each complainant arrived at the arranged meeting place, the perpetrator "forced [her] to perform oral sex on [him] at knifepoint" and robbed her of her cellphone and other property. Detective Pulliam testified that on one of the two occasions, the perpetrator also robbed the complainant's cousin, who had been waiting in a car outside the meeting location.

Detective Pulliam testified that in the morning following the second incident, she and her colleagues obtained telephone records for the sexual-assault complainants. The telephone records revealed a possible suspect: Both complainants had received calls from the same number during the relevant time periods. Detective Pulliam sought the assistance of the MPD's Technical Services Unit (TSU) to track the suspect's and the complainants' phones.

Sergeant Todd Perkins, a supervisor in the TSU, testified about his office's efforts to track the phones that morning. He testified that he and his team sought "subscriber information" for the suspect's number from the provider associated with that number but were unsuccessful—the cellphone "was just a generic prepaid" with "no subscriber information whatsoever." The TSU also sought and obtained information about the locations of the suspect's and complainants' cellphones from the relevant telecommunication providers.6 According to Sergeant Perkins, the TSU received updated location information from the providers every fifteen minutes. The information came in the form of geographic coordinates—latitude and longitude—with a "degree of uncertainty" specified in meters.

Sergeant Perkins testified that the real-time location information they received that morning had a high degree of uncertainty—"several hundred meter [s]"—indicating that the phones' GPS capabilities were inactive. He explained that "if it [had been] true GPS," his team would have been "getting two meter, three meter, five meter hits." Despite the lack of precision in the location information, Sergeant Perkins and his team were able to "tell that ... one of the [complainants'] phones and the [suspect's] phone were traveling in the same general direction ... as if they were together." The location information suggested that the two phones stopped in the general vicinity of the Minnesota Avenue Metro Station.

Based on this information, Sergeant Perkins and other TSU officers took a truck equipped with a cell-site simulator to the area of the Minnesota Avenue Metro station and used the device to track the suspect. Sergeant Perkins could not remember whether he and his team used the cell-site simulator to track the suspect's phone or the complainant's phone that they believed was traveling with it,7 but

168 A.3d 709

whichever signal they were tracking led them, at around 11:30 a.m., to a parked Saturn. Inside the Saturn were Mr. Jones and Mr. Jones's girlfriend, Nora Williams. The police arrested Mr. Jones and recovered evidence from Mr. Jones's person and his car and from Ms. Williams, including a folding knife and the complainants' and the suspect's cellphones. Mr. Jones also made an incriminating statement to the police. Ms. Williams later testified against Mr. Jones at trial.

B. Cell–Site Simulator

Sergeant Perkins testified at the suppression hearing about "how [the cell-site simulator they used] works," "based on the information that's publicly available." He explained that his team engages the cell-site simulator by programming into it a unique identifier—an MIN or IMSI number8 —associated with the target phone.9 The simulator then begins "listening for [the target] phone," which, as part of its normal operation, is "constantly transmitting to and receiving from a tower." The officers operating the cell-site simulator drive around and "as soon as [the simulator] comes across [the target phone's signal], it grabs it and it holds on to it." Once the cell-site simulator "grabs" the target phone, the simulator begins reporting "general location information and signal strength" that can be used to locate the target phone's exact location.10 Sergeant Perkins testified that once the cell-site simulator "grabs" the target phone, the target phone is prevented from communicating "with an actual ... tower."

Further information about the cell-site simulator was provided by Ben Levitan, an expert on "cellular telephone networks and systems" called by the defense.11 According to Mr. Levitan, cell phones are "dumb devices" that "generally connect themselves to the strongest cell tower signal that they detect." Mr. Levitan explained that a cell-site simulator "act[s] as a portable cell tower," which, "when turned on or brought into an area, may appear to be a stronger signal and cause [a] phone[ ] to break its connection with the cell phone network and reattach itself to the newly found ... simulator."12 Mr. Levitan testified

168 A.3d 710

that when the cellphone "attach[es]" itself to the cell-site simulator, it "identifies itself by phone number and various codes," including its IMSI number.13 Although Mr. Levitan had never used the type of cell-site simulator utilized by law enforcement, he testified that he had used similar devices working within the telecommunications industry and that the devices allow the user to determine the target phone's direction and distance relative to the simulator device.14 Moreover, because the cell-site simulator is not a true cell tower connected with the cellular network, any cellphone connected to the cell-site simulator will not be able to communicate with the network: "[Y]our call doesn't go through[,] period. Nothing happens."15

C. Trial Court's Ruling on the Motion To Suppress

In ruling on Mr. Jones's motion to suppress, the trial court did not decide whether the use of a cell-site simulator was a search within the meaning of the Fourth Amendment or...

To continue reading

Request your trial
28 cases
  • State v. Bowman
    • United States
    • Washington Supreme Court
    • November 10, 2021
    ... ... in a subsequent prosecutionrejecting the view of some of our sister states that any privacy interest in a text message is lost once the message is ... State Constitution, as well as the Fourth Amendment to the United States Constitution, by intruding on a private affair without authority of ... Jones , 565 U.S. 400, 132 S. Ct. 945, 181 L. Ed. 2d 911 (2012) (holding the ... ...
  • Mayo v. United States
    • United States
    • D.C. Court of Appeals
    • January 6, 2022
    ... ... No such circumstances are present here. 38 See, e.g. , Jones v. United States , 168 A.3d 703, 723 (D.C. 2017) (suppression of cell phones warranted where "undoubtedly one of the officers purposes in ... ...
  • State v. Olsen
    • United States
    • Washington Court of Appeals
    • April 3, 2019
    ... ... State v ... Jones , 68 Wn. App. 843, 847, 845 P.2d 1358 (1993) (quoting State v ... Foulkes ... Page 20 Olsen also cites to Carpenter v ... United States , ___ U.S. ___, 138 S. Ct. 2206, 201 L. Ed. 2d 507 (2018). 12 ... ...
  • State v. Olsen
    • United States
    • Washington Court of Appeals
    • April 3, 2019
    ... ... Amendment rights of others. State v. Jones , 68 ... Wn.App. 843, 847, 845 P.2d 1358 (1993) (quoting State v ... Olsen ... also cites to Carpenter v. United States , ___U.S ... ___, 138 S.Ct. 2206, 201 L.Ed.2d 507 (2018). [ ... ...
  • Request a trial to view additional results
6 books & journal articles
  • STINGRAY STUNG? ANALYZING CELLPHONES AS EFFECTS PROVIDES FOURTH AMENDMENT TREATMENT.
    • United States
    • Harvard Journal of Law & Technology Vol. 34 No. 2, March 2021
    • March 22, 2021
    ...that "[a]bsent a search warrant, the government may not turn a citizen's cellphone into a tracking device"); Jones v. United States, 168 A.3d 703, 707 (D.C. 2017) (holding that the government violated the Fourth Amendment when it deployed the cell-site simulator without first obtaining a wa......
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2020 Contents
    • July 31, 2020
    ...and doing so constitutes a Fourth Amendment search, just as it did in Carpenter . Id at 2230; see also Prince Jones v. United States , 168 A.3d 703, 712 (D.C. 2017) (recognizing that access to cell phone location data permits the “police to locate a person whose whereabouts were previously ......
  • Rethinking Police Expertise.
    • United States
    • Yale Law Journal Vol. 131 No. 2, November 2021
    • November 1, 2021
    ...Rule, 96 OR. L. REV. 337, 351-52 (2017). (409.) See, e.g., People v. Gordon, 68 N.Y.S.3d 306, 309 (Sup. Ct. 2017); Jones v. United States, 168 A.3d 703, 713 (D.C. 2017); State v. Andrews, 134 A.3d 324, 339-41 (Md. Ct. Spec. App. (410.) See Barry Friedman, Secret Policing, 2016 U. CHI. LEGAL......
  • George Floyd, general warrants, and cell-site simulators
    • United States
    • American Criminal Law Review No. 59-1, January 2022
    • January 1, 2022
    ...3d at 615 (citing Andrews , 134 A.3d at 324, Tate 849 N.W. 3d at 798). 146. See Zetter, supra note 141; see also Jones v. United States, 168 A.3d 703, 713, n.21 (D.C. 2017) (“[T]he cell-site simulator exploits a security vulnerability in the phone—the fact that cellphones are, in the words ......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT