Tucker v. Commonwealth
Decision Date | 09 October 2020 |
Docket Number | NOS. 2018-CA-1603-MR,AND 2018-CA-1773-MR,2018-CA-1641-MR,S. 2018-CA-1603-MR |
Parties | Ehmaud Lyjuan TUCKER, Appellant v. COMMONWEALTH of Kentucky, Appellee |
Court | Kentucky Court of Appeals |
BRIEF FOR APPELLANT: Aaron Reed Baker, Frankfort, Kentucky.
BRIEF FOR APPELLEE: Daniel Cameron, Attorney General of Kentucky, Christopher Henry, Assistant Attorney General, Frankfort, Kentucky.
BEFORE: ACREE, COMBS, AND MAZE, JUDGES.
Ehmaud Lyjuan Tucker appeals the Fayette Circuit Court's May 18, 2018 order denying his motion to suppress evidence obtained from his cell phone. Tucker believes the circuit court erred in denying his motion because the search warrant was overbroad. Finding no error, we affirm.
On July 7, 2017, police were investigating several recent burglaries in the Lexington area. An e-mail was distributed throughout the police department that included a description of the suspect. The e-mail described a black male in his late teens or early twenties wearing a pink North Face backpack. That day, police saw Tucker – who fit the description – and attempted to detain him. Tucker fled and, while running, tossed away a firearm. Police eventually caught Tucker and found the firearm, marijuana, and several of the stolen items.
After detaining Tucker, the police sought a warrant to search his cell phone. Detective Gary Cottrell prepared and signed an affidavit to serve as the basis for a judge's conclusion probable cause for a search warrant existed. The affidavit described Tucker's cell phone by location and by IMEI number.2 It sought "[a] complete forensic examination of the above listed Cellular telephone [including] examination by use of specialized software and techniques accepted by the computer forensic scientific community for a proper seizure and retention of digital evidence." (Record (R.) at 91.) The affidavit further stated that "there is probable and reasonable cause to believe and affiant does believe that said property constitutes ... evidence which tends to show that a crime has been committed or that a particular person has committed a crime." (Id. ) After describing the circumstance of Tucker's arrest, including the basis of the affiant's/officer's belief Tucker was involved in a series of burglaries between June 27 and July 7, 2017, the affidavit states:
It is the affiant's experience that cellular devices and cellular phone records can contain information showing whom the subjects have been in contact with and the locations of the contact, during specific time periods. It is also affiant's experience that data that has been deleted from a cellular device can be recovered during a forensic examination of the item.
(R. at 92.) The warrant was issued on July 10, 2017.
The warrant identifies Tucker's cell phone and then authorizes and describes the scope of the search as follows:
A complete forensic examination of the above listed Cellular telephone to include: phonebook, call history (including received, dialed and missed calls), incoming, outgoing and drafts of text messages, IMEI/ESN/IMSI number, pictures and images, video, audio recordings, ringtones, phone details, memory card and SIM card, for a full forensic examination by use of specialized software and techniques accepted by the computer forensic scientific community for the proper seizure and retention of digital evidence.
(R. at 94.)
The search revealed a video and photograph of Tucker holding an AR-15 rifle that was modified with non-factory parts. Those distinctive features were identified by a homeowner whose rifle was stolen during a burglary reported on May 25, 2017. The search also revealed a text message, delivered on May 25, 2017, referring to an AR-15 rifle. Based on this, police applied for, and received, another search warrant. This time the warrant was for Tucker's DNA. The goal was to match Tucker's DNA with blood evidence left during the May 25 burglary. The Kentucky State Police crime lab matched the evidence to Tucker's DNA, resulting in Tucker being charged with first-degree burglary in a new case.3
Tucker's counsel filed a motion to suppress evidence in the original case and the new burglary case. The motion was denied. Eventually, Tucker entered a conditional guilty plea for first-degree fleeing or evading police, tampering with physical evidence, receiving stolen property under $10,000, carrying a concealed deadly weapon, attempted tampering with a prisoner monitoring device, and first-degree burglary. The culmination of these sentences ran consecutively for a total of eleven (11) years. Tucker filed a notice of appeal in all three cases, which were consolidated for this review.
An appellate court reviewing a lower court's denial of a motion to suppress evidence utilizes a clear error standard of review for factual findings and a de novo standard of review for conclusions of law. Welch v. Commonwealth , 149 S.W.3d 407, 409 (Ky. 2004).
The Supreme Court of the United States has held there is a reasonable expectation of privacy in the contents of one's cell phone. Riley v. California , 573 U.S. 373, 385-86, 134 S. Ct. 2473, 2484-85, 189 L. Ed. 2d 430 (2014). Accordingly, a search warrant is generally required before an officer can search the data contained within a person's cell phone, and the warrant must meet the particularity requirement of the Fourth Amendment. The Fourth Amendment's requirement that a warrant Berger v. State of N.Y. , 388 U.S. 41, 58, 87 S. Ct. 1873, 1883, 18 L. Ed. 2d 1040 (1967) (citations omitted).
Tucker claims the warrant here was overbroad, lacking this necessary particularity, and thereby allowing the unconstitutional general search of his cell phone contents. He says the reason the warrant was overbroad is that "[i]t contained no reference to any specific crime for which the police were to search for evidence and contains no date restriction." (Appellant's brief, pp. 9-10.) This is not entirely correct.
We find guidance from this Court's factually similar case of Applegate v. Commonwealth , authored by Judge, now Justice, Nickell. 577 S.W.3d 83 (Ky. App. 2018), disc. rev. denied (Ky. Jun. 5, 2019). In that case, police officers conducted a lawful search of Applegate's car, discovering a handgun, drugs, scales, packaging materials, a tablet computer, digital camera, and two cell phones. Id. at 86. Believing the electronic devices might contain evidence pertinent to his drug investigation, the investigating officer prepared an affidavit for a search warrant of the cell phones and tablet. Id. Specifically, the affidavit stated the officer was looking for "photos, videos or communications related to guns, drug activity, co-conspirators, drug network activity and other associated information." Id. A warrant was issued, and a complete forensic examination of the electronic devices was conducted.
The examination revealed photographs of a methamphetamine cooking operation. In addition, the investigating officer opened various files containing photographs and videos depicting child pornography. Id. at 87. Based on this, a second warrant was sought, and issued, for the digital camera. No evidence of illegal activity was discovered. A third search warrant then issued allowing the examination of all the electronic devices. This search revealed text messages relating to drug trafficking and photographs and videos depicting child pornography. Id. Applegate moved to suppress all evidence seized. The motion was denied.
On appeal, Applegate argued, in part, the officers engaged in an improper "general" search of his electronic devices because they "looked at all the files recovered from the devices." Id. at 90. Justice Nickell first reiterated the prohibition against "general" searches and stated:
Id. at 90-91 (quoting Lundy v. Commonwealth , 511 S.W.3d 398, 402-03 (Ky. App. 2017) ).
Although...
To continue reading
Request your trial