Prince Jones v. United States , 168 A.3d 703 ( 2017 )


Menu:
  • Notice: This opinion is subject to formal revision before publication in the
    Atlantic and Maryland Reporters. Users are requested to notify the Clerk of the
    Court of any formal errors so that corrections may be made before the bound
    volumes go to press.
    DISTRICT OF COLUMBIA COURT OF APPEALS
    No. 15-CF-322
    09/21/2017
    PRINCE JONES, APPELLANT,
    V.
    UNITED STATES, APPELLEE.
    Appeal from the Superior Court
    of the District of Columbia
    (CF1-18140-13)
    (Hon. Jennifer M. Anderson, Trial Judge)
    (Argued April 18, 2017                               Decided September 21, 2017)
    Stefanie Schneider, Public Defender Service, with whom Samia Fam and
    Jaclyn Frankfurt, Public Defender Service, were on the brief, for appellant.
    Lauren R. Bates, Assistant United States Attorney, with whom Channing D.
    Phillips, United States Attorney, and Elizabeth Trosman, John P. Mannarino, and
    Jodi S. Lazarus, Assistant United States Attorneys, were on the brief, for appellee.
    Nathan Freed Wessler, American Civil Liberties Union, with whom Arthur
    B. Spitzer and Scott Michelman, American Civil Liberties Union, and Jennifer
    Lynch, Electronic Frontier Foundation, were on the brief, for American Civil
    Liberties Union of the Nation‘s Capital and Electronic Frontier Foundation, amicus
    curiae, in support of appellant.
    Before THOMPSON and BECKWITH, Associate Judges, and FARRELL, Senior
    Judge.
    2
    Opinion by Associate Judge BECKWITH for the court, except as to Part II.E.3.
    Opinion by Senior Judge FARRELL, concurring in part and concurring in the
    judgment, at page 47.
    Dissenting opinion by Associate Judge THOMPSON, at page 54.
    BECKWITH, Associate Judge: A jury found appellant Prince Jones guilty of
    various offenses arising out of two alleged incidents of sexual assault and robbery
    at knifepoint.1 Mr. Jones appeals his convictions on the ground that much of the
    evidence offered against him at trial was the direct or indirect product of a
    warrantless—and thus, Mr. Jones argues, unlawful—search involving a cell-site
    simulator or ―stingray.‖2 Mr. Jones presented this Fourth Amendment claim to the
    trial court in a pretrial motion to suppress, but the trial court denied it under the
    1
    Mr. Jones was convicted of two counts of first-degree sexual abuse while
    armed, D.C. Code §§ 22-3002 (a)(1)–(2), -3020 (a)(5), -3020 (a)(6), -4502 (2012
    Repl.); two counts of kidnapping while armed, 
    id. §§ 22-2001,
    -4502; four counts
    of robbery while armed, 
    id. §§ 22-2801,
    -4502; and one count of threats, 
    id. § 22-
    1810.
    2
    The ―StingRay‖ is a popular cell-site simulator produced by the Harris
    Corporation. See Stephanie K. Pell & Christopher Soghoian, Your Secret
    Stingray’s No Secret Anymore: The Vanishing Government Monopoly over Cell
    Phone Surveillance and Its Impact on National Security and Consumer Privacy, 28
    Harv. J.L. & Tech. 1, 14 (2014). The name has become a generic term for a cell-
    site simulator. Kim Zetter, Hacker Lexicon: Stingrays, the Spy Tool the
    Government Tried, and Failed, to Hide, Wired (May 6, 2016),
    https://www.wired.com/2016/05/hacker-lexicon-stingrays-spy-tool-government-
    tried-failed-hide/. The record in this case does not reveal the name of the device
    used against Mr. Jones; in the suppression hearing, the trial court sustained the
    government‘s objection to a question about the name of the device.
    3
    inevitable-discovery doctrine3 and did not reach the question whether the
    government violated Mr. Jones‘s rights.       We agree with Mr. Jones that the
    government violated the Fourth Amendment when it deployed the cell-site
    simulator against him without first obtaining a warrant based on probable cause.
    Further, we reverse the trial court‘s inevitable-discovery ruling and reject the
    government‘s argument (not resolved by the trial court) that the good-faith
    doctrine4 precludes applying the exclusionary rule in this case.       Because the
    admission at trial of the evidence obtained as a result of the unlawful search was
    not harmless beyond a reasonable doubt, we reverse Mr. Jones‘s convictions.
    I. Background
    A. Investigation and Arrest of Mr. Jones
    At the suppression hearing in this case, Detective Rachel Pulliam, a member
    of the Sexual Assault Unit of the Metropolitan Police Department (MPD), testified
    that she investigated a sexual assault that occurred around 12:30 a.m. on October 9,
    2013, and another that occurred around 1:30 a.m. on October 11. The two sexual-
    3
    See Nix v. Williams, 
    467 U.S. 431
    (1984).
    4
    See United States v. Leon, 
    468 U.S. 897
    (1984).
    4
    assault complainants were women who had advertised escort services on the
    classified-advertising website Backpage. Detective Pulliam testified that on each
    occasion, the perpetrator5 contacted the complainant by telephone in response to an
    advertisement and arranged to pay the complainant for sexual services. According
    to Detective Pulliam, when each complainant arrived at the arranged meeting
    place, the perpetrator ―forced [her] to perform oral sex on [him] at knifepoint‖ and
    robbed her of her cellphone and other property. Detective Pulliam testified that on
    one of the two occasions, the perpetrator also robbed the complainant‘s cousin,
    who had been waiting in a car outside the meeting location.
    Detective Pulliam testified that in the morning following the second
    incident, she and her colleagues obtained telephone records for the sexual-assault
    complainants.    The telephone records revealed a possible suspect:            Both
    complainants had received calls from the same number during the relevant time
    periods. Detective Pulliam sought the assistance of the MPD‘s Technical Services
    Unit (TSU) to track the suspect‘s and the complainants‘ phones.
    5
    Detective Pulliam referred to the perpetrator as ―the defendant,‖ but Mr.
    Jones was not known to the police at the time the complainants reported the crimes
    and only became known after the police tracked him down using the cell-site
    simulator.
    5
    Sergeant Todd Perkins, a supervisor in the TSU, testified about his office‘s
    efforts to track the phones that morning. He testified that he and his team sought
    ―subscriber information‖ for the suspect‘s number from the provider associated
    with that number but were unsuccessful—the cellphone ―was just a generic
    prepaid‖ with ―no subscriber information whatsoever.‖ The TSU also sought and
    obtained information about the locations of the suspect‘s and complainants‘
    cellphones from the relevant telecommunication providers.6 According to Sergeant
    Perkins, the TSU received updated location information from the providers every
    fifteen minutes. The information came in the form of geographic coordinates—
    latitude and longitude—with a ―degree of uncertainty‖ specified in meters.
    Sergeant Perkins testified that the real-time location information they
    received that morning had a high degree of uncertainty—―several hundred
    meter[s]‖—indicating that the phones‘ GPS capabilities were inactive.            He
    explained that ―if it [had been] true GPS,‖ his team would have been ―getting two
    meter, three meter, five meter hits.‖ Despite the lack of precision in the location
    information, Sergeant Perkins and his team were able to ―tell that . . . one of the
    6
    Officer Perkins testified that the TSU ―declared an exigent situation‖ and
    was therefore ―able to obtain the [real-time location] information without getting a
    warrant.‖ Officer Perkins admitted at the suppression hearing that his team had
    been operating under an erroneous belief that there had been a string of three
    sexual assaults by the same perpetrator within the preceding twenty-four hours.
    6
    [complainants‘] phones and the [suspect‘s] phone were traveling in the same
    general direction . . . as if they were together.‖ The location information suggested
    that the two phones stopped in the general vicinity of the Minnesota Avenue Metro
    Station.
    Based on this information, Sergeant Perkins and other TSU officers took a
    truck equipped with a cell-site simulator to the area of the Minnesota Avenue
    Metro station and used the device to track the suspect. Sergeant Perkins could not
    remember whether he and his team used the cell-site simulator to track the
    suspect‘s phone or the complainant‘s phone that they believed was traveling with
    it,7 but whichever signal they were tracking led them, at around 11:30 a.m., to a
    parked Saturn. Inside the Saturn were Mr. Jones and Mr. Jones‘s girlfriend, Nora
    Williams. The police arrested Mr. Jones and recovered evidence from Mr. Jones‘s
    person and his car and from Ms. Williams, including a folding knife and the
    7
    As explained in the testimony summarized below, a cell-site simulator
    interferes with the target phone‘s ability to communicate with the cellular network.
    Records for the complainant‘s phone show that there was a single communication
    error around the time the TSU officers were operating the cell-site simulator, and
    Sergeant Perkins inferred from this—and from other circumstantial information—
    that his team had probably been tracking the complainant‘s phone. Other
    evidence, however, suggested that the TSU may have been tracking the suspect‘s
    phone. In particular, records for the suspect‘s phone—which turned out to be Mr.
    Jones‘s phone—show seven failed calls during the relevant time period, and a data
    dump of the phone revealed that during that time period Mr. Jones sent a text
    message which said, ―Our call dropped.‖
    7
    complainants‘ and the suspect‘s cellphones. Mr. Jones also made an incriminating
    statement to the police. Ms. Williams later testified against Mr. Jones at trial.
    B. Cell-Site Simulator
    Sergeant Perkins testified at the suppression hearing about ―how [the cell-
    site simulator they used] works,‖ ―based on the information that‘s publicly
    available.‖   He explained that his team engages the cell-site simulator by
    programming into it a unique identifier—an MIN or IMSI number8—associated
    with the target phone.9     The simulator then begins ―listening for [the target]
    phone,‖ which, as part of its normal operation, is ―constantly transmitting to and
    receiving from a tower.‖      The officers operating the cell-site simulator drive
    around and ―as soon as [the simulator] comes across [the target phone‘s signal], it
    8
    These identifying numbers are distinct from the seven- or ten-digit number
    that a person dials when he or she places a call. Sergeant Perkins testified that the
    TSU receives these numbers by requesting ―subscriber information‖ for a phone
    number. He explained that ―MIN‖ stands for ―mobile identification number‖ and
    is the identifying number used by ―Verizon, Cricket and Sprint‖ and that ―IMSI‖
    stands for ―international mobile subscriber identification‖ and is used by ―T-
    Mobile and AT&T.‖
    9
    Sergeant Perkins testified that it is also possible to enter multiple
    identifying numbers into the cell-site simulator. In this operating mode, he
    explained, ―the equipment will just let us know one of those phones is present in
    the area‖ but will not provide location information.
    8
    grabs it and it holds on to it.‖ Once the cell-site simulator ―grabs‖ the target
    phone, the simulator begins reporting ―general location information and signal
    strength‖ that can be used to locate the target phone‘s exact location.10 Sergeant
    Perkins testified that once the cell-site simulator ―grabs‖ the target phone, the
    target phone is prevented from communicating ―with an actual . . . tower.‖
    Further information about the cell-site simulator was provided by Ben
    Levitan, an expert on ―cellular telephone networks and systems‖ called by the
    defense.11    According to Mr. Levitan, cell phones are ―dumb devices‖ that
    ―generally connect themselves to the strongest cell tower signal that they detect.‖
    Mr. Levitan explained that a cell-site simulator ―act[s] as a portable cell tower,‖
    which, ―when turned on or brought into an area, may appear to be a stronger signal
    and cause [a] phone[] to break its connection with the cell phone network and
    10
    Sergeant Perkins explained the search process thus:
    [T]here is a directional antenna, . . . so we‘re driving this
    way, the directional antenna knows the signal is coming
    from over here, so we know the phone‘s coming over
    there. And then it also measures the signal strength from
    the phone, so if the signal strength is real, real low, it‘s
    probably somewhere behind you.
    11
    The defense also submitted an affidavit by Mr. Levitan, which Mr.
    Levitan ―adopt[ed] . . . as part of [his] testimony,‖ without objection by the
    government.
    9
    reattach itself to the newly found . . . simulator.‖12 Mr. Levitan testified that when
    the cellphone ―attach[es]‖ itself to the cell-site simulator, it ―identifies itself by
    phone number and various codes,‖ including its IMSI number.13 Although Mr.
    Levitan had never used the type of cell-site simulator utilized by law enforcement,
    he   testified   that   he   had   used   similar   devices   working     within   the
    telecommunications industry and that the devices allow the user to determine the
    target phone‘s direction and distance relative to the simulator device.14 Moreover,
    because the cell-site simulator is not a true cell tower connected with the cellular
    network, any cellphone connected to the cell-site simulator will not be able to
    communicate with the network:         ―[Y]our call doesn‘t go through[,] period.
    12
    Mr. Levitan testified that a cell-site simulator causes not only the target
    phone, but ―[a]ll cell phones that are in the vicinity,‖ to ―attach . . . to the newly
    found . . . simulator.‖
    13
    Cell-site simulators are sometimes referred to as ―IMSI catchers.‖ Pell &
    Soghoian, supra note 2, at 11.
    14
    Mr. Levitan testified that when a cellphone is communicating with a
    legitimate cellular tower, it communicates with a particular sector antenna of the
    tower, and that the provider can thus determine ―what side of the cell tower‖ the
    cellphone is on. Mr. Levitan indicated that cell-site simulators measure direction
    through a similar method. But 
    see supra
    note 10 (Sergeant Perkins describing a
    somewhat different method of determining direction). And Mr. Levitan testified
    that a cell-site simulator can determine distance through a ―trick‖ in which it
    ―send[s] . . . a signal [to the phone] and ask[s] it to send . . . the signal back.‖ By
    ―measur[ing] th[e] round trip time,‖ the distance between the cell-site simulator
    and the phone can be determined.
    10
    Nothing happens.‖15
    C. Trial Court’s Ruling on the Motion To Suppress
    In ruling on Mr. Jones‘s motion to suppress, the trial court did not decide
    whether the use of a cell-site simulator was a search within the meaning of the
    Fourth Amendment or whether the government was required to obtain a warrant to
    use the cell-site simulator.    Instead, the trial court focused on the issues of
    standing, exigent circumstances, and inevitable discovery.
    15
    We note that both witnesses‘ testimony about the cell-site simulator is
    consistent with information in a Department of Justice memorandum on such
    devices. See Dep‘t of Justice Policy Guidance: Use of Cell-Site Simulator
    Technology (Sept. 3, 2015), https://www.justice.gov/opa/file/767321/download.
    The memorandum explains:
    Cell-site simulators . . . function by transmitting as a cell
    tower. In response to the signals emitted by the
    simulator, cellular devices in the proximity of the device
    identify the simulator as the most attractive cell tower in
    the area and thus transmit signals to the simulator that
    identify the device in the same way that they would with
    a networked tower.
    
    Id. at 2.
    Once the target cellphone is identified, the cell-site simulator ―provide[s]
    . . . the relative signal strength and general direction‖ of the phone. 
    Id. The memorandum
    notes that the cell-site simulator can cause ―cellular devices in the
    area [to] experience a temporary disruption of service from the service provider.‖
    
    Id. at 5.
                                            11
    On the issue of standing, the trial court stated that the suppression-hearing
    record did not reveal ―with any great degree of certainty‖ which phone—Mr.
    Jones‘s or the complainant‘s—the police had tracked using the cell-site simulator.
    The court believed that the burden was on the government to show that the police
    did not track Mr. Jones‘s phone and found that the government had failed to meet
    this burden. The government did not take issue with this allocation of the burden
    of proof and agreed with the court‘s determination.16
    The trial court rejected the government‘s argument that there were exigent
    circumstances justifying noncompliance with any otherwise applicable warrant
    requirement—though, again, the trial court did not determine whether there was a
    warrant requirement. The court noted that significant time (around ten hours) had
    passed between the sexual assault and the arrest of Mr. Jones on October 11,
    during which time ―the detectives could have been getting a warrant.‖
    The trial court agreed with the government‘s argument that regardless of
    whether there had been a Fourth Amendment violation, the inevitable-discovery
    16
    The government has reversed course in this appeal and is now arguing
    that Mr. Jones bore the burden of proving that the government searched his phone
    and failed to meet this burden. But because the government affirmatively—and
    repeatedly—conceded the standing issue in the trial court, the government has
    waived this argument.
    12
    doctrine rendered the exclusionary rule inapplicable. The court found that ―even if
    [the police] were using [Mr. Jones‘s] phone on the cell site simulator, . . . had they
    switched over . . . to use the [complainant‘s] number instead, . . . they would have
    eventually gotten to the exact same place because the phones were together[ a]nd
    it‘s the same technology.‖ The court thus agreed with the government‘s assertion
    that ―there[ was] a separate lawful means‖ by which the government ―would have
    gotten to the exact same place.‖
    II. Discussion
    Mr. Jones claims that the government‘s use of a cell-site simulator violated
    his Fourth Amendment rights and that the trial court erred in failing to grant his
    motion to suppress. In deciding this Fourth Amendment claim, we defer to the
    trial court‘s factual findings and review them only for clear error, but we review
    the trial court‘s legal conclusions de novo. (Albert) Jones v. United States, 
    154 A.3d 591
    , 594 (D.C. 2017). The Fourth Amendment protects the ―right of the
    people to be secure in their persons, houses, papers, and effects, against
    unreasonable searches and seizures,‖ and thus we turn first to the threshold
    question whether the government‘s use of the cell-site simulator to locate Mr.
    13
    Jones‘s cellphone17 constituted a search or seizure.
    A. Fourth Amendment Search
    Government conduct is a ―search‖ within the meaning of the Fourth
    Amendment if it invades ―an actual (subjective) expectation of privacy . . . that
    society is prepared to recognize as reasonable.‖ Katz v. United States, 
    389 U.S. 347
    , 361 (1967) (Harlan, J., concurring) (internal quotation marks omitted); see
    also Kyllo v. United States, 
    533 U.S. 27
    , 33 (2001); Napper v. United States, 
    22 A.3d 758
    , 767 (D.C. 2011).       In deciding whether a particular expectation of
    privacy is ―reasonable,‖ this court aims to ―assure[] preservation of that degree of
    privacy against government that existed when the Fourth Amendment was
    adopted.‖ 
    Kyllo, 533 U.S. at 34
    . ―To withdraw protection of this minimum
    expectation would be to permit police technology to erode the privacy guaranteed
    by the Fourth Amendment.‖ 
    Id. Our analysis
    begins with the obvious fact that most people have a cellphone
    17
    We consider it conceded that the government deployed the cell-site
    simulator on Mr. Jones‘s phone rather than on one of the complainants‘ phones.
    See supra notes 7 & 16, as well as the accompanying text.
    14
    and carry it with them practically everywhere they go.18 One consequence of this
    is that locating and tracking a cellphone using a cell-site simulator has the
    substantial potential to expose the owner‘s intimate personal information. First,
    ―cell phone tracking can easily invade the right to privacy in one‘s home or other
    private areas.‖ Tracey v. State, 
    152 So. 3d 504
    , 524 (Fla. 2014); see also State v.
    Earls, 
    70 A.3d 630
    , 642 (N.J. 2013) (―[C]ell phones . . . blur the historical
    distinction between public and private areas because [they] emit signals from both
    places.‖). When this occurs, there is a ―clear[] . . . Fourth Amendment violation.‖
    
    Tracey, 152 So. 3d at 524
    ; see also United States v. Karo, 
    468 U.S. 705
    , 714
    (1984) (―[P]rivate residences are places in which the individual normally expects
    privacy free of governmental intrusion not authorized by a warrant, and that
    expectation is plainly one that society is prepared to recognize as justifiable.‖).
    And second, even a person‘s public movements, as observed by a cell-site
    simulator or other means of cellphone tracking, can reveal sensitive information
    about the person‘s ―familial, political, professional, religious, and sexual
    associations.‖   United States v. (Antoine) Jones, 
    565 U.S. 400
    , 415 (2012)
    (Sotomayor, J., concurring).
    18
    See Riley v. California, 
    134 S. Ct. 2473
    , 2490 (2014) (―[I]t is the person
    who is not carrying a cell phone . . . who is the exception. According to one poll,
    nearly three-quarters of smart phone users report being within five feet of their
    phones most of the time . . . .‖).
    15
    Another consequence of cellphones‘ ―pervasiveness‖19 is that a cell-site
    simulator can be used by the government not merely to track a person but to locate
    him or her. See State v. Andrews, 
    134 A.3d 324
    , 348 (Md. Ct. Spec. App. 2016).
    Police have always had the capacity to visually track a suspect from some starting
    location, and electronic tracking devices like those used in United States v. Knotts,
    
    460 U.S. 276
    (1983), and Karo, 
    468 U.S. 705
    , have augmented this preexisting
    capacity. But although the kind of device used in Knotts and Karo is probably
    more reliable than a human tracker—less prone to discovery than a human and
    harder to elude—at their core these devices merely enable police officers to
    accomplish the same task that they could have accomplished through ―[v]isual
    surveillance from public places.‖ 
    Knotts, 460 U.S. at 282
    ; see also 
    Karo, 468 U.S. at 713
    . This is because the tracking device must be physically installed on some
    object that the target will later acquire or use. See, e.g., (Antoine) 
    Jones, 565 U.S. at 402
    –03 (GPS tracker placed on the defendant‘s wife‘s car); 
    Karo, 468 U.S. at 708
    (tracker placed in container of chemicals the defendant had purchased);
    
    Knotts, 460 U.S. at 276
    (same). These devices do not enable police to locate a
    person whose whereabouts were previously completely unknown.
    With a cell-site simulator, however, police no longer need to track a person
    19
    Riley, supra note 
    18, 134 S. Ct. at 2490
    .
    16
    visually from some starting location or physically install a tracking device on an
    object that is in, or will come into, his or her possession. Instead, they can
    remotely activate the latent tracking function of a device that the person is almost
    certainly carrying in his or her pocket or purse: a cellphone. As the present case
    demonstrates, police officers first obtain subscriber information and real-time
    location information from the target‘s telecommunications provider to narrow
    down the search area.20 They then proceed to that area with a cell-site simulator,
    20
    Mr. Jones has not argued in this appeal that the government violated his
    Fourth Amendment rights when it obtained real-time cell-site location information
    (CSLI) for his phone from his telecommunications provider. Also not involved in
    this case is historical CSLI—location information maintained by cellular
    companies in the ordinary course of business. Some courts have held that the
    Fourth Amendment protects real-time CSLI, e.g., 
    Tracey, 152 So. 3d at 523
    , but
    many have held that the Fourth Amendment does not protect historical CSLI, e.g.,
    United States v. Graham, 
    824 F.3d 421
    , 427–28 (4th Cir. 2016) (en banc). See
    generally Eric Lode, Annotation, Validity of Use of Cellular Telephone or Tower
    to Track Prospective, Real Time, or Historical Position of Possessor of Phone
    Under Fourth Amendment, 92 A.L.R. Fed. 2d 1 (2015). The Fourth Amendment
    analysis for real-time and historical CSLI disclosed by a telecommunications
    provider is complicated by uncertainty about the applicability and scope of the
    third-party doctrine. Compare 
    Graham, 824 F.3d at 427
    –28 (―Each time
    Defendants made or received a call, or sent or received a text message—activities
    well within the ‗ordinary course‘ of cell phone ownership—[their provider]
    generated a record of the cell towers used . . . . Having ‗exposed‘ the CSLI to
    [their provider], Defendants here, like the defendant in Smith, ‗assumed the risk‘
    that the phone company would disclose their [historical CSLI] to the government.‖
    (quoting Smith v. Maryland, 
    444 U.S. 735
    , 744 (1979))), with In re United States
    for an Order Authorizing the Release of Historical Cell-Site Info., 
    809 F. Supp. 2d 113
    , 126 (E.D.N.Y. 2011) (―[T]he court concludes that established normative
    privacy considerations support the conclusion that the reasonable expectation of
    privacy is preserved here, despite the fact that cell-site-location records [are]
    (continued…)
    17
    which they use to force the person‘s cellphone to identify itself and reveal its exact
    location. It is in this sense that a cell-site simulator is a locating, not merely a
    tracking, device:   A cell-site simulator allows police officers who possess a
    person‘s telephone number to discover that person‘s precise location remotely and
    at will.
    A final consideration is that when the police use a cell-site simulator to
    locate a person‘s cellphone, the simulator does not merely passively listen for
    transmissions sent by the phone in the ordinary course of the phone‘s operation.
    Instead, the cell-site simulator exploits a security vulnerability in the phone—the
    fact that cellphones are, in the words of the defense expert, ―dumb devices,‖ unable
    to differentiate between a legitimate cellular tower and a cell-site simulator
    masquerading as one21—and actively induces the phone to divulge its identifying
    information. Once the phone is identified, it can be located. So far as the present
    record reveals, the only countermeasure that a person can undertake is to turn off
    (…continued)
    disclosed to cell-phone service providers.‖). The third-party doctrine has no
    application in the present case, however, because the police‘s use of a cell-site
    simulator is ―direct government surveillance.‖ 
    Graham, 824 F.3d at 426
    & n.4.
    21
    See also Pell & Soghoian, supra note 2, at 12 (explaining that active
    surveillance devices exploit the lack of an authentication mechanism in the 2G
    phone protocol design).
    18
    his or her cellphone or its radios (put it in ―airplane mode‖), thus forgoing its use
    as a communication device.
    The preceding considerations lead us to conclude that the use of a cell-site
    simulator to locate Mr. Jones‘s phone invaded a reasonable expectation of privacy
    and was thus a search. First, given the potential for location information gathered
    by a cell-site simulator or other device to reveal sensitive personal facts, people
    justifiably seek to keep such information private. This is insufficient, in itself, to
    support our conclusion that the government invaded a legitimate expectation of
    privacy: Supreme Court precedent makes clear that certain forms of tracking do
    not invade a reasonable expectation of privacy. See 
    Knotts, 460 U.S. at 282
    (holding that the use of an electronic device to track a suspect‘s movements in
    public spaces did not invade a reasonable expectation of privacy); 22 see also 
    Karo, 468 U.S. at 719
    (holding that the unlawful use of a device to track movements
    inside a residence did not necessarily taint the otherwise lawful use of the same
    device to track the suspects in public).
    22
    But see (Antoine) 
    Jones, 565 U.S. at 416
    (Sotomayor, J., concurring) (―I
    do not regard as dispositive the fact that the Government might obtain the fruits of
    GPS monitoring through lawful conventional surveillance techniques.‖); 
    id. at 430
    (Alito, J., concurring in judgment) (―[T]he use of longer term GPS monitoring in
    investigations of most offenses impinges on expectations of privacy.‖).
    19
    But in addition to the fact that people reasonably value and hope to protect
    the privacy of their location information, what necessitates our conclusion is the
    method by which the government obtained the location information in this case.
    See 
    Kyllo, 533 U.S. at 35
    n.2 (―The fact that equivalent information could
    sometimes be obtained by other means does not make lawful the use of means that
    violate the Fourth Amendment.‖); United States v. Maynard, 
    615 F.3d 544
    , 566
    (D.C. Cir. 2010) (―[W]hen it comes to the Fourth Amendment, means do matter.‖),
    aff’d on other grounds by (Antoine) Jones, 
    565 U.S. 400
    . Unlike in a situation in
    which the government determines a person‘s location through visual surveillance
    or by employing the older generation of tracking devices, see 
    Karo, 468 U.S. at 719
    ; 
    Knotts, 460 U.S. at 282
    , it cannot be argued that ―the information obtained by
    [the government] in this case was . . . readily available and in the public view,‖
    
    Andrews, 134 A.3d at 348
    . The cell-site simulator employed in this case gave the
    government a powerful person-locating capability that private actors do not have
    and that, as explained above, the government itself had previously lacked—a
    capability only superficially analogous to the visual tracking of a suspect.23 And
    23
    We are accordingly unpersuaded by one court‘s suggestion that using
    cellular technology to track a suspect is analogous to using ―dogs . . . to track a
    fugitive . . . [by] his scent.‖ United States v. Skinner, 
    690 F.3d 772
    , 777 (6th Cir.
    2012). And our dissenting colleague‘s suggestion that the search here was
    permitted under the automobile exception to the Fourth Amendment, see post at
    86–88, is similarly unconvincing. The dissent argues that under the automobile
    (continued…)
    20
    the simulator‘s operation involved exploitation of a security flaw in a device that
    most people now feel obligated to carry with them at all times. Allowing the
    government to deploy such a powerful tool without judicial oversight would surely
    ―shrink the realm of guaranteed privacy‖ far below that which ―existed when the
    Fourth Amendment was adopted.‖ 
    Kyllo, 533 U.S. at 34
    . It would also place an
    individual in the difficult position either of accepting the risk that at any moment
    his or her cellphone could be converted into tracking device or of forgoing
    ―necessary use of‖ the cellphone. 
    Tracey, 152 So. 3d at 523
    . We thus conclude
    that under ordinary circumstances, the use of a cell-site simulator to locate a person
    through his or her cellphone invades the person‘s actual,24 legitimate, and
    (…continued)
    exception, police officers could have searched Mr. Jones‘s car without a warrant
    and seized ―any cell phones in it that might have been contraband or evidence of
    the crime.‖ Post at 88. From this, the dissent claims, it follows that the police had
    the right to use the cell-site simulator to search or seize Mr. Jones‘s phone. This
    argument glosses over the fact that what the cell-site simulator obtained was Mr.
    Jones‘s location information. When police search a car under the automobile
    exception, by contrast, they do not obtain location information—they already know
    the car‘s location if they are searching it. The dissent also glosses over the fact that
    the police need probable cause to search a car under the automobile exception.
    Tuckson v. United States, 
    77 A.3d 357
    , 366 (D.C. 2013). The police here did not
    have probable cause to believe that there was evidence of a crime inside Mr.
    Jones‘s car until they used the cell-site simulator to locate Mr. Jones‘s cellphone.
    24
    Ordinarily, a person need not do anything affirmative to exhibit an actual
    subjective expectation that he or she will not be located and tracked by a cell-site
    simulator. In Katz, the defendant was ―entitled to assume‖ that his phone
    conversation was private based purely on the fact that he had ―occupie[d] [the
    (continued…)
    21
    reasonable expectation of privacy in his or her location information and is a search.
    The government‘s argument to the contrary is unpersuasive.                 The
    government contends that because a cellphone ―must continuously broadcast a
    signal,‖ a person who carries or uses a cellphone is engaging in ―conduct [that] is
    not calculated to keep [his] location private and . . . thus[] has no reasonable
    expectation of privacy in his location.‖ The government cites for support United
    States v. Wheeler, 
    169 F. Supp. 3d 896
    (E.D. Wis. 2016), in which the court found
    that ―today, when many Americans own some sort of cell phone and carry it
    frequently, an individual‘s expectation that the government could not track his
    whereabouts over time is [not] reasonable.‖ 
    Id. at 908;
    see also 
    id. (―The media
    is
    rife with information—and sometimes warnings—about the fact that one‘s location
    can be tracked from one‘s cell phone.‖).25 This line of reasoning rests on a
    (…continued)
    phone booth], shut[] the door behind him, and pa[id] the 
    toll.‖ 389 U.S. at 352
    .
    Likewise, in Kyllo, the Supreme Court found that the use of a thermal imager on
    the defendant‘s home violated an expectation of privacy, without any discussion
    about whether the defendant had taken measures to thwart the effectiveness of the
    
    device. 533 U.S. at 40
    . But in fact in the present case, there was some evidence
    that Mr. Jones affirmatively sought to keep his location information private: His
    phone‘s GPS feature (to the extent it existed) had been disabled.
    25
    The government also cites United States v. Caraballo, 
    831 F.3d 95
    (2d
    Cir. 2016), cert. denied, 
    137 S. Ct. 654
    (2017), a case in which the police obtained
    real-time cell-site location information without a warrant. See supra note 20. The
    court approved the officers‘ actions under the exigency exception. Caraballo, 831
    (continued…)
    22
    misreading of the Katz expectation-of-privacy test that construes the test as
    involving a probabilistic inquiry (an inquiry into whether it is likely—or the public
    thinks it is likely—that the government can access the information in question)
    rather than a normative one (an inquiry into whether it is consistent with the
    nation‘s traditions and values that the government should have unfettered access to
    the information).26 Contrary to the government‘s argument, Katz makes clear that
    (…continued)
    F.3d at 106. The court stated that ―any expectation of privacy that [the defendant]
    had in his cell-phone location was dubious at best.‖ 
    Id. at 105.
    But this remark
    was part of a broader exigency analysis, and the court‘s primary justification for it
    was the lack of decisive authority on the question. See 
    id. at 106
    (―[T]he fact that
    the question of the degree of privacy that adheres to these sorts of information, to
    date, divides those Circuit courts that have spoken to the issue reinforces the
    conclusion that the intrusion here was not to an established, core privacy value.‖).
    26
    Moreover, the factual premise of the government‘s argument is
    erroneous. The events at issue in this case occurred in 2013, and at that time cell-
    site simulators were relatively unknown to the public. Law-enforcement agencies
    around the country that acquired the device had been required (and, for all we
    know, still continue to be required) to sign nondisclosure agreements with the
    Federal Bureau of Investigation. See Matt Richtel, A Police Gadget Tracks
    Phones? Shhh! It’s Secret, N.Y. Times, Mar. 15, 2015, https://www.nytimes.com/
    2015/03/16/business/a-police-gadget-tracks-phones-shhh-its-secret.html; Pell &
    Soghoian, supra note 2, at 38. Indeed, amici curiae have provided us with a
    redacted copy of a nondisclosure agreement that the MPD signed. By signing this
    agreement, the MPD agreed that, among other things, ―the equipment/technology
    and any information related to its functions, operation, and use shall . . . [not be]
    disclos[ed] . . . to the public in any manner including but not limited to: in press
    releases, in court documents, during judicial hearings, or during other public
    forums.‖ See also 
    Andrews, 134 A.3d at 338
    (detailing a similar agreement signed
    by the Baltimore City Police Department). There is no evidence in the record that
    Mr. Jones was aware of the government‘s secret use of the cell-site simulator and
    (continued…)
    23
    a person does not lose a reasonable expectation of privacy merely because he or
    she is made aware of the government‘s capacity to invade his or her privacy.
    When Katz was issued, the public and the courts were well aware of the
    government‘s capacity to wiretap and eavesdrop through technological means, yet
    the Supreme Court did not find this fact determinative of the question whether
    individuals possess a reasonable expectation of privacy in their conversations. See
    
    Katz, 389 U.S. at 352
    (citing Olmstead v. United States, 
    277 U.S. 438
    (1928)
    (wiretapping), and Goldman v. United States, 
    316 U.S. 129
    (1942) (bugging)); see
    also Susan Freiwald, First Principles of Communications Privacy, 2007 Stan.
    Tech. L. Rev. 3, 28 (―In the several years preceding Katz, the public had learned of
    rampant illegal wiretapping from numerous influential books, scholarly articles,
    and newspaper accounts.‖). A person‘s awareness that the government can locate
    and track him or her using his or her cellphone likewise should not be sufficient to
    negate the person‘s otherwise legitimate expectation of privacy. See also Smith v.
    Maryland, 
    442 U.S. 735
    , 741 n.5 (1979) (―[W]here an individual‘s subjective
    expectations ha[ve] been ‗conditioned‘ by influences alien to well-recognized
    Fourth Amendment freedoms, those subjective expectations obviously could play
    no meaningful role in ascertaining what the scope of Fourth Amendment protection
    (…continued)
    little reason to believe that the public was widely aware of it.
    24
    [is].‖); 1 Wayne R. LaFave, Search and Seizure:         A Treatise on the Fourth
    Amendment § 2.1 (d) (5th ed. 2016) (―[W]hat is involved here is ‗our societal
    understanding‘ regarding what deserves ‗protection from government invasion.‘‖
    (quoting Oliver v. United States, 
    466 U.S. 170
    , 178 (1984))).
    The government‘s use of the cell-site simulator to locate Mr. Jones was
    therefore a search.27 The government did not obtain a warrant and has not argued
    27
    We need not rule on Mr. Jones‘s alternative argument that the
    government‘s conduct here constituted a search under (Antoine) Jones, 
    565 U.S. 400
    , where the court held that a trespass used to obtain information constitutes a
    Fourth Amendment search. Mr. Jones makes a plausible argument that the
    government‘s conduct constituted a trespass to his chattel—that is, that the
    government ―intentionally . . . us[ed] or intermeddl[ed]‖ with his chattel, his
    cellphone. Restatement (Second) of Torts § 217 (Am. Law Inst. 1965). The
    government, through the cell-site simulator, coopted Mr. Jones‘s phone, forcing it
    to do something Mr. Jones surely never intended it to do: reveal its identifying and
    location information to an entity other than a telecommunications provider.
    Moreover, it is a natural consequence of a cell-site simulator‘s use that it will
    disrupt the operation of the target phone, and there is reason to believe that this
    happened here, given the records showing Mr. Jones‘s seven failed calls. See
    supra note 7. And numerous courts have held that computer hacking and
    interference with electronic resources can satisfy the elements of common-law
    trespass to chattels. See generally Marjorie A. Shields, Annotation, Applicability
    of Common-Law Trespass Actions to Electronic Communications, 
    107 A.L.R. 5th 549
    (2003).
    But the question whether the holding of (Antoine) Jones extends beyond
    physical trespasses is still an open one. It is unclear, first of all, whether the
    holding of (Antoine) Jones depends on ―the law of trespass as it existed at the time
    of the adoption of the Fourth Amendment‖ or whether new forms of the tort are
    
    relevant. 565 U.S. at 426
    (Alito, J., concurring in judgment). Assuming that the
    former is the case, it is also not clear whether ―the[] recent decisions [recognizing
    (continued…)
    25
    that the search ―f[ell] within a specific exception to the warrant requirement,‖ and
    therefore the search was unlawful under the Fourth Amendment. United States v.
    Riley, 
    134 S. Ct. 2473
    , 2482 (2014); see also United States v. Lewis, 
    147 A.3d 236
    ,
    239 (D.C. 2016) (en banc) (―A search conducted without a warrant is per se
    unreasonable under the Fourth Amendment unless it falls within a few specific and
    well-established exceptions.‖ (quoting United States v. Taylor, 
    49 A.3d 818
    , 821
    (D.C. 2012))).28
    (…continued)
    electronic trespass to chattels] represent a change in the law or simply the
    application of the old tort to new situations.‖ 
    Id. at 426–27
    (Alito, J., concurring in
    judgment). Mr. Jones‘s counsel pointed out during oral argument that courts
    recognized forms of nonphysical trespass on chattels long before the electronic
    age, suggesting a possible answer to the second of these questions. See, e.g., Cole
    v. Fisher, 
    11 Mass. 137
    (1814) (holding that the plaintiff could sue for trespass to
    chattels where the sound of the defendant‘s gunshot frightened the plaintiff‘s
    horse, resulting in damage to the plaintiff‘s carriage); see also W. Page Keeton et
    al., Prosser and Keeton on Torts § 14 n.8 (5th ed. 1984) (citing other cases). Yet
    we do not have to answer these ―vexing‖ questions today. (Antoine) 
    Jones, 565 U.S. at 426
    (Alito, J., concurring in judgment).
    28
    Arguing that ―bystanders[‘] . . . phones [can be] ensnared by the cell site
    simulator,‖ 
    see supra
    notes 12 and 15, amici curiae ask us to adopt a requirement
    that ―any cell site simulator warrant must include provisions to minimize
    collection, retention, and use of bystanders‘ data.‖ See In re Application of the
    United States for an Order Relating to Telephones Used by Suppressed, No. 15 M
    0021, 
    2015 WL 6871289
    , at *3–4 (N.D. Ill. Nov. 9, 2015); In re Search Warrant,
    
    71 A.3d 1158
    , 1170 (Vt. 2012) (―Warrants for electronic surveillance routinely set
    out ‗minimization‘ requirements—procedures for how and under what conditions
    the electronic surveillance may be conducted—in order to ‗afford similar
    protections to those that are present in the use of conventional warrants authorizing
    (continued…)
    26
    Our conclusion that the government violated Mr. Jones‘s Fourth
    Amendment rights is not the end of our inquiry. We must decide whether Mr.
    Jones is entitled to a remedy, and if so what the scope of that remedy should be.
    As a general matter, the ―[e]xclusionary rule . . . forbids the use of improperly
    obtained evidence at trial.‖ Herring v. United States, 
    555 U.S. 135
    , 139 (2009).
    ―[T]his judicially created rule is ‗designed to safeguard Fourth Amendment rights
    generally through its deterrent effect.‘‖ 
    Id. at 139–40
    (quoting United States v.
    Calandra, 
    414 U.S. 338
    , 348 (1974)).           The government argues that the
    exclusionary rule does not apply in this case, invoking the inevitable-discovery
    doctrine, good-faith exception, and a change in its policies concerning the use of
    cell-site simulators. The government also argues that much of the evidence that
    Mr. Jones wants excluded does not fall within the scope of the exclusionary rule—
    that it is not ―fruit of the poisonous tree.‖ Wong Sun v. United States, 
    371 U.S. 471
    , 488 (1963). We first address the inevitable-discovery doctrine.
    B. Inevitable-Discovery Doctrine
    (…continued)
    the seizure of tangible evidence.‘‖ (quoting Berger v. New York, 
    388 U.S. 41
    , 57
    (1967)) (brackets removed)). The issue of interference with third parties‘ phones is
    not before us in this appeal, however.
    27
    The inevitable-discovery doctrine ―shields illegally obtained evidence from
    the exclusionary rule if the government can show, by a preponderance of the
    evidence, that the evidence ‗ultimately or inevitably would have been discovered
    by lawful means.‘‖ Gore v. United States, 
    145 A.3d 540
    , 548 (D.C. 2016) (quoting
    Hicks v. United States, 
    730 A.2d 657
    , 659 (D.C. 1999)); see also Nix v. Williams,
    
    467 U.S. 431
    (1984). To avail itself of the inevitable-discovery doctrine, the
    government must prove two distinct elements: (1) that ―the lawful process which
    would have ended in the inevitable discovery . . . ha[d] commenced before the
    constitutionally invalid seizure,‖ and (2) that there is a ―‗requisite actuality‘ that
    the discovery would have ultimately been made by lawful means.‖ 
    Hicks, 730 A.2d at 659
    (quoting Douglas-Bey v. United States, 
    490 A.2d 1137
    , 1139 n.6 (D.C.
    1985), and Hilliard v. United States, 
    638 A.2d 698
    , 707 (D.C. 1994)) (brackets and
    ellipsis removed).
    The trial court found that ―had [the police] switched [the cell-site simulator]
    over to use the [complainant‘s phone] . . . they would have eventually gotten to the
    exact same place because the phones were together.‖ Assuming for the sake of
    argument that the hearing evidence supports this finding,29 we agree with the trial
    29
    Mr. Jones argues that this finding was clearly erroneous because ―[t]he
    government presented no expert testimony about the functioning of the cell site
    (continued…)
    28
    court that this finding justifies a conclusion that there was a separate lawful means
    by which the police could have captured Mr. Jones and recovered the evidence
    used against him at trial.30 The finding is insufficient, however, to support a
    conclusion that the police would have captured Mr. Jones—which is what the
    inevitable-discovery doctrine requires.
    The undisputed evidence in the record shows that the MPD possessed only
    a single operating cell-site simulator,31 and that it could only be used to locate a
    single phone at a time. The police used it to search for Mr. Jones‘s cellphone.
    Thus, the police‘s search for the complainant‘s cellphone—the lawful process—
    never occurred. If the lawful search never occurred, it did not ―commence[] before
    (…continued)
    simulator, choosing instead to present only lay testimony [by Sergeant Perkins]
    about how the field operators use the device.‖ In Mr. Jones‘s view, ―there is no
    evidence in the record about the failure rate of the cell site simulator or whether it
    statistically works better with certain models of phones or on certain networks.‖
    30
    In this regard, we note that not only did Mr. Jones concede that he lacked
    standing to contest a search involving the complainant‘s phone, but also the record
    suggests that the complainant consented to the police‘s tracking of her phone. See
    United States v. Johnson, 
    380 F.3d 1013
    , 1017 (7th Cir. 2004) (holding that to rely
    on the inevitable-discovery doctrine the government must prove a lawful means by
    which it would have obtained the evidence, and that it is insufficient to prove
    merely that ―the evidence would have been discovered as a consequence of [an]
    illegal search of [a third party], to which [the defendant] could not object‖).
    31
    The MPD owned another unit, but it was not working properly the day of
    the search.
    29
    the constitutionally invalid seizure‖ of Mr. Jones. 
    Hicks, 730 A.2d at 659
    (quoting
    
    Douglas-Bey, 490 A.2d at 1139
    n.6).
    The government disagrees with this conclusion and argues that because the
    police had tracked the complainant‘s phone using real-time location information
    from the provider and had obtained her phone‘s identifying information, they ―had
    begun the process necessary to locate her phone with the cell-[s]ite simulator.‖
    Even if we agreed that these steps constituted the commencement of a lawful
    process, we would nonetheless find the second element of the inevitable-discovery
    test—the ―requisite actuality‖ that the process would have led to the discovery of
    Mr. Jones—lacking. This is because the police either suspended or abandoned the
    purported lawful process when they chose to deploy the only operational cell-site
    simulator in their possession on Mr. Jones‘s phone.
    This court has found the inevitable-discovery doctrine applicable in cases in
    which the police engaged in lawful and unlawful processes in parallel.          See
    Pinkney v. United States, 
    851 A.2d 479
    , 495 (D.C. 2004); McFerguson v. United
    States, 
    770 A.2d 66
    , 74–75 (D.C. 2001); 
    Hicks, 730 A.2d at 662
    . Had the unlawful
    process not occurred in these cases, the lawful one would inevitably have produced
    the same evidentiary result. But here the government is asking us to find inevitable
    discovery where the police had mutually exclusive options and, for whatever
    30
    reason, chose the option that turned out to be unlawful. The inevitable-discovery
    doctrine does not apply in this type of situation. See 
    Gore, 145 A.3d at 549
    n.32
    (―[T]he argument that ‗if we hadn't done it wrong, we would have done it right‘ is
    far from compelling.‖ (quoting 6 LaFave, supra, § 11.4 (a)) (internal quotation
    marks omitted)).32
    32
    Unlike our dissenting colleague, we are not persuaded by the
    government‘s alternative argument that because Mr. Jones was carrying the stolen
    phones, which could have been located and tracked lawfully (it is assumed), Mr.
    Jones had no expectation of privacy in his location. This argument was not raised
    in the initial briefing or in the trial court—it was first raised at oral argument
    before this court in response to questions from the bench. Although after oral
    argument we requested supplemental briefing on this argument, we ultimately
    conclude that the government‘s failure to present it at an earlier stage constitutes a
    waiver of the argument under the circumstances of this case. See Tuckson v.
    United States, 
    77 A.3d 357
    , 366 (D.C. 2013); Rose v. United States, 
    629 A.2d 526
    ,
    535 (D.C. 1993); see also Greenlaw v. United States, 
    554 U.S. 237
    , 244 (2008)
    (―We wait for cases to come to us, and when they do we normally decide only
    questions presented by the parties. Counsel almost always know a great deal more
    about their cases than we do, and this must be particularly true of counsel for the
    United States, the richest, most powerful, and best represented litigant to appear
    before us.‖ (quoting United States v. Samuels, 
    808 F.2d 1298
    , 1301 (8th Cir.
    1987) (Arnold, J., concurring in denial of rehearing en banc))). In any case, the
    argument is unpersuasive because, as we have explained above, ―[t]he fact that
    equivalent information could sometimes be obtained by other means does not make
    lawful the use of means that violate the Fourth Amendment.‖ 
    Kyllo, 533 U.S. at 35
    n.2; see also 
    Maynard, 615 F.3d at 566
    . And as amici have cogently argued in
    their supplemental submission, ―[c]onsidering as part of the reasonable-
    expectation-of-privacy inquiry the availability of alternative means to gather
    information would collapse inevitable discovery into the reasonable-expectation
    question in a manner that would radically transform both doctrines.‖ As amici
    explain, were we to adopt the government‘s—and the dissent‘s—novel theory of
    (continued…)
    31
    C. Good-Faith Exception
    We turn next to the government‘s argument that application of the
    exclusionary rule here ―would not meaningfully deter police misconduct‖ because
    the use of the cell-site simulator to locate Mr. Jones was ―not the type of ‗flagrant‘
    abuse for which the exclusionary rule was designed.‖ In support of this argument,
    the government notes that Sergeant Perkins and his team believed ―exigent
    circumstances existed‖ and asserts that ―at the time of this incident, no court had
    held that using a simulator to locate a phone violates the Fourth Amendment.‖ The
    government further points out that the police received judicial approval for various
    secondary searches of the evidence recovered from Mr. Jones and Ms. Williams at
    the time of Mr. Jones‘s arrest. Specifically, the police obtained warrants to search
    Mr. Jones‘s Saturn and the phones they recovered from Mr. Jones and Ms.
    Williams, and secured a court order to take a buccal swab from Mr. Jones.
    Although it does not explicitly say so, the government is invoking the
    (…continued)
    affirmance, ―the contours of the inevitable discovery doctrine, a carefully crafted
    exception to the exclusionary rule with strict requirements, would be subject to
    end-runs, because the possibility of an alternative means of discovery could often
    be repackaged as a reason to reject an expectation of privacy in the first place‖
    (citation omitted).
    32
    ―good-faith exception.‖ Davis v. United States, 
    564 U.S. 229
    , 239 (2011). The
    Supreme Court first recognized this exception in United States v. Leon, 
    468 U.S. 897
    (1984), holding that ―evidence obtained [by the police] in objectively
    reasonable reliance on a subsequently invalidated search warrant‖ is not subject to
    the exclusionary rule. 
    Id. at 922.
    This holding was based on the premise that ―the
    deterrence rationale [for exclusion] loses much of its force‖ ―when the police act
    with an objectively reasonable good-faith belief that their conduct is lawful.‖
    
    Davis, 564 U.S. at 252
    ; 
    id. at 238
    (quoting 
    Leon, 468 U.S. at 909
    , 919) (internal
    quotation marks omitted). The Court has since extended the good-faith exception
    to apply in various other situations involving nonculpable or merely negligent law-
    enforcement conduct.     See, e.g., 
    id. at 239–40
    (holding that the good-faith
    exception applies ―when the police conduct a search in objectively reasonable
    reliance on binding judicial precedent‖); 
    Herring, 555 U.S. at 136
    (holding that the
    good-faith exception applied to evidence obtained in a search incident to arrest
    where the officer ―reasonably believe[d] there [wa]s an outstanding arrest warrant‖
    for the defendant, but where ―that belief turn[ed] out to be wrong because of a
    negligent bookkeeping error by another police employee‖).
    The Supreme Court has not, however, recognized the applicability of the
    good-faith exception in a situation remotely like the present one—where the
    33
    police, not acting pursuant to a seemingly valid warrant, statute, or court opinion,
    conducted an unlawful search using a secret technology that they had shielded
    from judicial oversight and public scrutiny. See supra note 26. Indeed, assuming
    the police believed the warrantless use of the cell-site simulator to be lawful, they
    could not have reasonably relied on that belief, given the secrecy surrounding the
    device and the lack of law on the issue.33 And the government does not argue that
    the police officers‘ mistaken belief that exigent circumstances existed was
    reasonable or cite any case law that would support such an argument.
    The fact that some of the evidence was obtained in secondary searches
    pursuant to warrants and a court order does not change things. The police‘s
    reliance on the warrants and order was not objectively reasonable because the
    warrants and order were based on information obtained in violation of Mr. Jones‘s
    Fourth Amendment rights. See Evans v. United States, 
    122 A.3d 876
    , 886 (D.C.
    2015) (―The subsequent issuance of [a] search warrant . . . , based on information
    [illegally] obtained . . . , d[oes] not operate to attenuate the [original] illegality.‖). 34
    33
    The Supreme Court has implicitly foreclosed the government‘s argument
    that police can reasonably conclude from the complete lack of judicial precedent
    that their conduct is lawful. See 
    Davis, 564 U.S. at 248
    (suggesting that the good-
    faith exception for police reliance on binding judicial precedent would not apply
    where ―the precedent is distinguishable‖).
    34
    The government cites United States v. McClain, 
    444 F.3d 556
    (6th Cir.
    (continued…)
    34
    Thus, the evidence the police obtained through their warrantless use of the cell-site
    simulator is not subject to the good-faith exception.
    D. Change in Department of Justice Policy
    The government‘s final argument for not applying the exclusionary rule is
    that a change in Department of Justice (DOJ) policy has diminished the likelihood
    that excluding the evidence in this case will deter misconduct in the future. The
    government asserts that the MPD is bound by a new DOJ policy to ―obtain a search
    warrant supported by probable cause‖ before deploying a cell-site simulator. Dep‘t
    of Justice Policy Guidance: Use of Cell-Site Simulator Technology at 3–4 (Sept.
    3, 2015), https://www.justice.gov/opa/file/767321/download.
    (…continued)
    2006), in which the court declined to apply the exclusionary rule where officers
    conducted a search pursuant to a warrant based in large part on information that
    had been illegally gathered. This court‘s holding in Evans precludes us from
    following McClain. And in any case, McClain is distinguishable because there the
    ―warrant affidavit fully disclosed to a neutral and detached magistrate the
    circumstances surrounding the initial [illegal] search.‖ 
    Id. at 566.
    Here, by
    contrast, the police did not disclose in their applications for the warrants and order
    that they had deployed a cell-site simulator to locate Mr. Jones. Indeed, in the
    otherwise lengthy affidavit for the warrants, the officers‘ search for Mr. Jones is
    described in a single sentence: ―[T]he Defendant was located by members of the
    Washington, D.C. Metropolitan Police Department . . . .‖ The government cannot
    rely on the Leon good-faith exception when the police have not been ―frank with
    the magistrate in proceedings to obtain the warrant.‖ United States v. Reilly, 
    76 F.3d 1271
    , 1273 (2d Cir.), on reh’g, 
    91 F.3d 331
    (2d Cir. 1996).
    35
    The government did not develop this argument in the trial court—and could
    not have, as the DOJ policy had not yet been issued—and we do not find it
    persuasive. The government has not cited any case in which a court has declined
    to apply the exclusionary rule based on the government‘s representation that it will
    not engage in unlawful conduct in the future. The government cites Blair v. United
    States, 
    114 A.3d 960
    (D.C. 2015), but in that case we relied on a change in a
    statute that eliminated the need to deter subsequent violations, not a mere change
    in policy. 
    Id. at 973–74.
    And given that the DOJ policy memorandum does not
    describe any sort of enforcement mechanism that would ensure compliance with
    the policy, and given that the present administration or a subsequent one may well
    revise this policy, we are not convinced that the need to deter future constitutional
    violations is lacking.
    E. Fruit of the Poisonous Tree
    Having decided that the exclusionary rule applies in this case, we must now
    decide which evidence should be excluded as ―fruit of the poisonous tree‖ of the
    illegal search.35   Wong 
    Sun, 371 U.S. at 488
    .       In deciding whether evidence
    35
    In the trial court, Mr. Jones specifically moved to ―[s]uppress
    [i]dentifications, [s]tatements, and [t]angible evidence‖ resulting from the illegal
    search. The evidence and testimony that Mr. Jones identifies as fruits of the
    (continued…)
    36
    constitutes fruit of the poisonous tree, the critical inquiry is whether ―the evidence
    . . . has been come at by exploitation of th[e] illegality or instead by means
    sufficiently distinguishable to be purged of the primary taint.‖ Wong 
    Sun, 371 U.S. at 488
    (quoting John Maguire, Evidence of Guilt 221 (1959)); see also Wilson v.
    United States, 
    102 A.3d 751
    , 753 (D.C. 2014). The court considers ―[t]he temporal
    proximity of the [illegality] and the [acquisition of the evidence], the presence of
    intervening circumstances, and, particularly, the purpose and flagrancy of the
    official misconduct.‖ Brown v. Illinois, 
    422 U.S. 590
    , 603–04 (1975) (citations
    and footnote omitted); see also Gordon v. United States, 
    120 A.3d 73
    , 85 (D.C.
    2015).
    Mr. Jones argues that the following evidence and testimony should have
    been excluded as fruits of the poisonous tree: his knife, a statement he made to the
    (…continued)
    poisonous tree in this appeal clearly fall within these categories, and the
    government could not have reasonably doubted that Mr. Jones intended to have
    them suppressed. The government had a ―full and fair opportunity‖ in the trial
    court to litigate this matter. Barnett v. United States, 
    525 A.2d 197
    , 200 (D.C.
    1987). And the record before us is ―of amply sufficient detail and depth‖ to permit
    us to decide the scope of the exclusionary rule as a matter of law. Brown v.
    Illinois, 
    422 U.S. 590
    , 604 (1975). We thus (except as to the testimony of Ms.
    Williams, see infra note 41) decline the government‘s request that we remand the
    case so that the trial court can ―hold hearings, make factual findings of fact, and
    reach legal conclusions on the application of the fruit-of-the-poisonous-tree
    doctrine.‖
    37
    police at the scene of his arrest, cellphones recovered from Ms. Williams‘s purse at
    the scene of the arrest, evidence (including cellphones) recovered from his car (the
    Saturn) pursuant to a warrant, data extracted from the various cellphones pursuant
    to warrants, the testimony of Ms. Williams, the later photo-array identification of
    Mr. Jones by one of the complainants, a DNA profile generated from a buccal
    swab of Mr. Jones (a month after his arrest), and a photograph of Mr. Jones‘s
    groin.36 The government ―agrees that some, but not all, of the . . . evidence
    [identified by Mr. Jones] is a fruit of the alleged poisonous tree.‖ The government
    only specifically objects to classifying (1) Mr. Jones‘s statement to the police, (2)
    the cellphones recovered from Ms. Williams‘s purse, and (3) Ms. Williams‘s
    testimony as fruits of the poisonous tree.
    1. Prince Jones’s Statement
    Mr. Jones made an incriminating statement to the police at the scene of the
    arrest: When asked what his address was, Mr. Jones gave the address of one of the
    sexual-assault complainants. The government argues that this statement should not
    be suppressed as a fruit of the unlawful cell-site-simulator search because ―[i]t
    36
    One of the complainants testified at trial about the appearance of Mr.
    Jones‘s genital area, and the photograph of Mr. Jones‘s groin was admitted in
    evidence at trial.
    38
    would make little sense to suppress evidence obtained merely as part of a routine
    booking procedure.‖ See Thomas v. United States, 
    731 A.2d 415
    , 421 (D.C. 1999)
    (recognizing ―a routine booking question exception‖ to the rule of Miranda v.
    Arizona, 
    384 U.S. 436
    (1966)). We reject this argument. That the question about
    Mr. Jones‘s address was otherwise proper does not negate the fact that very little
    time and no substantial intervening circumstances separated the illegal search from
    Mr. Jones‘s incriminating response. See United States v. Olivares-Rangel, 
    458 F.3d 1104
    , 1112 (10th Cir. 2006). Mr. Jones‘s statement was a direct product of
    the unlawful search and is thus excludable as fruit of the poisonous tree.
    2. Cellphones from Nora Williams’s Purse
    When the police located Mr. Jones and Ms. Williams, they searched Ms.
    Williams‘s purse and found several cellphones, including two of the complainants‘
    phones and Mr. Jones‘s phone. The government argues that the contents of Ms.
    Williams‘s purse are not fruits of the poisonous tree because Mr. Jones did ―not
    have a reasonable expectation of privacy in the contents of Ms. Williams‘s purse‖
    and because ―Ms. Williams gave the officers consent to search her purse.‖
    Preliminarily, Mr. Jones‘s expectation of privacy (or lack thereof) in Ms.
    Williams‘s purse is not a material consideration in the fruit-of-the-poisonous-tree
    39
    analysis. As one court has explained, ―[w]hile the fruit of the poisonous tree
    doctrine applies only when the defendant has standing regarding the Fourth
    Amendment violation which constitutes the poisonous tree, the law imposes no
    separate standing requirement regarding the evidence which constitutes the fruit of
    that poisonous tree.‖37 
    Olivares-Rangel, 458 F.3d at 1117
    (citation omitted); see
    also 6 LaFave, supra, § 11.4 (―If the defendant [has] standing with respect to the
    poisonous tree, that alone suffices . . . .‖).
    The factors in 
    Brown, 422 U.S. at 604
    , moreover, compel a conclusion that
    the contents of Ms. Williams‘s purse are fruits of the poisonous tree. First, as the
    search of Ms. Williams‘s purse occurred at the scene of Mr. Jones‘s apprehension
    and arrest, very little time passed between the police‘s unlawful cell-site-simulator
    search and their recovery of the evidence from Ms. Williams‘s purse.
    37
    United States v. Bowley, 
    435 F.3d 426
    , 430–31 (3d Cir. 2006), and United
    States v. Pineda-Chinchilla, 
    712 F.2d 942
    , 943–44 (5th Cir. 1983), cited by the
    government, stand only for the narrow proposition that a defendant cannot
    suppress the contents of his immigration file even if the prosecuting authority‘s
    discovery of that file or its connection to the defendant was based on evidence
    gathered in an illegal search or seizure. Thus, even if we were to find these cases
    persuasive, but see 6 LaFave, supra, § 11.4 & n.22, they would not support the
    proposition that a defendant must always—or even usually—have standing in a
    particular item of evidence to have it suppressed as a fruit of an illegal search or
    seizure.
    40
    Second, Ms. Williams‘s supposed consent was not a significant intervening
    circumstance. According to Detective Pulliam, Ms. Williams consented only after
    the police presented her with the following options: the police ―would either have
    to take the purse and put it into police custody until [they] could get a search
    warrant and then search it or . . . she could give [the police] consent to search it.‖
    Given this threat and the fact that her boyfriend, Mr. Jones, had just been arrested
    in her presence, Ms. Williams‘s consent was not sufficiently ―the product of free
    will [to] break . . . the causal connection between the illegality and the‖ search of
    the purse. 
    Brown, 422 U.S. at 603
    ; cf. Utah v. Strieff, 
    136 S. Ct. 2056
    , 2062 (2016)
    (holding that a valid arrest warrant ―entirely unconnected with the [illegal] stop‖
    was a sufficient intervening circumstance); 4 LaFave, supra, § 8.2 (c) (explaining
    that a person‘s consent to a search may be involuntary where the police, ―‗trading
    on‘ a prior Fourth Amendment violation,‖ have ―threat[ened] to seek a warrant‖).38
    And third, although the police officers‘ warrantless use of the cell-site
    38
    The proper inquiry here is not whether Ms. Williams‘s consent was a
    valid waiver of her own rights, but rather whether it constituted an intervening
    circumstance sufficient to purge the taint of the illegal search. Thus, we need not
    decide whether Ms. Williams could have had the evidence excluded had she
    herself been tried. See generally 4 LaFave, supra, § 8.2 (c) (discussing Fourth
    Amendment cases in which ―the police have obtained consent to search after
    threatening that if consent were not given they would proceed to seek or obtain a
    search warrant‖).
    41
    simulator here was not flagrant misconduct,39 recovery of Mr. Jones‘s cellphone
    and the complainants‘ phones was undoubtedly one of the officers‘ purposes in
    deploying the cell-site simulator. The cell-site simulator is used to locate and track
    phones after all. The contents of Ms. Williams‘s purse thus ―bear a . . . close
    relationship to the underlying illegality.‖ 
    Gordon, 120 A.3d at 85
    (quoting New
    York v. Harris, 
    495 U.S. 14
    , 19 (1990)).40
    3. Nora Williams’s Testimony41
    Mr. Jones argues that Ms. Williams should have been barred from testifying
    39
    But 
    see supra
    text accompanying note 33.
    40
    The government contends that even if the cellphones in Ms. Williams‘s
    purse are fruits of the poisonous tree, the ―call detail records and location
    information obtained from the provider‖ for the cellphones ―are not subject to
    exclusion.‖ Mr. Jones has not argued otherwise, and we see no reason for
    classifying this information as fruit of the poisonous tree.
    The government also represents in its brief that ―the government received an
    unsolicited offender hit from the FBI‘s Combined DNA Index System (‗CODIS‘)
    indicating that a sample obtained from [Mr. Jones] in connection with [a] prior
    Maryland conviction matches the crime scene sample obtained in this case.‖
    Assuming that the government can demonstrate this in the trial court, we agree
    with the government that it ―should not be precluded from seeking another buccal
    swab [from Mr. Jones] based on the independent and untainted CODIS hit.‖ This
    CODIS hit would not be a fruit of the illegal search.
    41
    This part does not constitute the opinion of the court, as it is not joined by
    Associate Judge THOMPSON or Senior Judge FARRELL.
    42
    for the government at trial. The government disagrees, arguing that ―[t]here was
    sufficient attenuation between the search and Ms. Williams‘s testimony to dissipate
    any taint‖ and that ―the government would have inevitably discovered Ms.
    Williams through independent sources.‖
    In United States v. Ceccolini, 
    435 U.S. 268
    (1978), the Supreme Court
    recognized factors pertinent to the determination of whether a witness‘s testimony
    should be barred as fruit of the poisonous tree: (1) whether ―the testimony given by
    the witness was an act of her own free will in no way coerced,‖ (2) whether
    evidence gathered or information learned as a result of the illegal search was used
    to question the witness, (3) whether ―[s]ubstantial periods of time elapsed between
    the time of the illegal search and the initial contact with the witness . . . and
    between the [initial contact] and the testimony at trial,‖ (4) whether the witness and
    ―her relationship with the [defendant] were well known‖ to the police before the
    illegal search, and (5) whether the officers conducting the illegal search did so with
    the ―intent of finding a willing and knowledgeable witness to testify against‖ the
    defendant. 
    Id. at 279–80;
    see also 6 LaFave, supra, § 11.4 (i). These factors
    weigh in favor of excluding Ms. Williams‘s testimony.
    First, it is undisputed that Ms. Williams was not a willing witness for the
    government.    As the government points out, Ms. Williams was initially ―not
    43
    forthcoming about her knowledge and use of the . . . items‖ stolen from the
    complainants, and only testified after ―the government sought and received a court
    order granting her immunity.‖ Ms. Williams testified at trial that after she was
    granted immunity, she testified for the grand jury ―[b]ecause [she] had no choice.‖
    She expressed unhappiness about having to testify against Mr. Jones at trial, stating
    that she ―didn‘t want to go against him.‖
    Second, the government admits that the police ―confronted [Ms. Williams]
    with the fact that stolen phones and other items were recovered from her purse and
    from the car.‖ This evidence, as explained above, was the product of the illegal
    search. The government‘s attempt to minimize the significance of this fact is
    unpersuasive.   The government contends that the ―illegally obtained evidence
    ultimately did not play a great role in obtaining Ms. Williams‘s testimony‖ and that
    it was the grant of immunity that was the decisive factor. But this argument fails to
    address the fact that the police questioned Ms. Williams before she was
    immunized, and is also speculative: It is plausible—indeed, likely—that both the
    grant of immunity and fact that Ms. Williams was found red-handed with the
    proceeds of the robberies played significant roles in her decision to testify.
    Third, a very short period of time passed between the illegal search and Ms.
    Williams‘s first contact with the police. Indeed, Ms. Williams was present at Mr.
    44
    Jones‘s arrest and was questioned at the scene. See United States v. Ramirez-
    Sandoval, 
    872 F.2d 1392
    , 1397 (9th Cir. 1989). Approximately a year passed
    between the police‘s initial contact with Ms. Williams and her testimony at trial,
    but a lengthy period between first contact and trial is almost always present in a
    criminal case, and this time period is less significant than the time period between
    the search and first contact. Moreover, the witness‘s initial statements to the police
    will often significantly constrain the witness‘s testimony at trial because the initial
    statements can be used to impeach the witness or bolster his or her testimony. See
    1 Kenneth S. Broun et al., McCormick on Evidence § 34 (7th ed. 2016) (discussing
    the procedure of impeaching a witness with a prior inconsistent statement); 
    id. § 47
    (discussing the procedure of supporting a witness with a prior consistent
    statement).
    Fourth, although at trial the government offered in evidence surveillance
    footage of Ms. Williams using an ATM card stolen from one of the complainants,
    at the suppression hearing the government neither presented evidence nor argued
    that the police had this video before they conducted the illegal cell-site-simulator
    search or that the video would have enabled the police to locate Ms. Williams.
    Thus, based on the record before the court, it is not possible to conclude that the
    police were aware of Ms. Williams or her relationship with Mr. Jones before they
    45
    located her through the illegal search. See also supra note 35.
    The remaining factor favors the government. Specifically, there is no reason
    to believe that the police intended their use of the cell-site simulator to result in the
    discovery of a witness for the government. Rather, the record before the court
    suggests that the police were trying to locate Mr. Jones—and, as a necessary
    consequence of their use of cellphone tracking, Mr. Jones‘s cellphone.
    Nonetheless, because the other four factors strongly weigh in favor of suppression,
    there is ―a close[], . . . direct link between the illegality and [Ms. Williams‘s]
    testimony.‖ 
    Ceccolini, 435 U.S. at 278
    .
    F. Harmless-Error Analysis
    The introduction of evidence collected in violation of Mr. Jones‘s Fourth
    Amendment right to be free from unreasonable searches and seizures is
    constitutional error.   So we must reverse Mr. Jones‘s convictions unless the
    government has ―prove[d] beyond a reasonable doubt that the error . . . did not
    contribute to the verdict.‖     Chapman v. California, 
    386 U.S. 18
    , 24 (1967).
    Because we have concluded that the fruits identified by Mr. Jones should have
    46
    been excluded at his trial,42 and because these fruits comprised some of the most
    damning evidence against him, we need not undertake a detailed analysis to
    conclude that the erroneous admission of these fruits at trial was not harmless
    beyond a reasonable doubt. The government does not argue otherwise.
    III. Conclusion
    For the foregoing reasons, we reverse the judgment of the trial court and
    remand for further proceedings consistent with this opinion.
    42
    To be entirely accurate, we have reached this conclusion with respect to
    all of the purported fruits except for the testimony of Ms. Williams. See supra
    note 41. The conclusion that the error was not harmless beyond a reasonable doubt
    nonetheless stands.
    47
    FARRELL, Senior Judge, concurring in part and concurring in the judgment:
    I agree with Judge Beckwith that the police‘ use of the cell-site simulator to
    discover appellant‘s precise location violated the Fourth Amendment because it
    was a ―search‖ requiring a warrant. My analysis of why that is so is more limited
    than Judge Beckwith‘s, however. I also agree that the government has not shown
    that the fruits of the use of the simulator would have been inevitably discovered by
    lawful means, and that this is not the sort of case in which the Supreme Court has
    found that suppression of the fruits would serve no deterrent purpose. Further,
    except that I would not decide whether the testimony of Nora Williams should
    have been suppressed, I agree that the evidence discussed in part II. E. of Judge
    Beckwith‘s opinion was suppressible fruit of the warrantless search. Finally, I
    explain briefly why I am not persuaded by Judge Thompson‘s position in dissent
    that no search at all under the Fourth Amendment took place.
    I.
    As to inevitable discovery, a key argument by appellee in its original brief, I
    agree that the government has failed to show the ―requisite actuality,‖ Hicks v.
    United States, 
    730 A.2d 657
    , 659 (D.C. 1999), that tracking the complainants‘
    cellphones with the simulator, had that taken place, would have led to the same
    seizure of incriminating evidence.      The government in its brief states that
    48
    appellant‘s and the complainants‘ cellphones ―were ultimately found together in
    appellant‘s car,‖ and that since ―the simulator was close enough to locate one of
    the phones, it inevitably was close enough to locate the other‖ (Appellee‘s Brief at
    32). But this analysis is troublesome partly because it relies on the fruits of the
    actual simulator use. See 6 WAYNE R. LAFAVE, Search and Seizure: A Treatise on
    the Fourth Amendment § 11.4 (a), at 283 (5th ed. 2016) (―‗[T]he fact making
    discovery inevitable must arise from circumstances other than those disclosed by
    the illegal search itself.‘‖). Moreover, the police began using the simulator a
    considerable length of time after appellant had come into possession of the
    complainants‘ cellphones, and even then some 30–45 minutes elapsed before the
    simulator directed them to appellant‘s car and cellphone. So there is too much
    surmise, I submit, in the reasoning that if the police had used the simulator to
    locate the complainants‘ phones instead, those phones would still have been in
    appellant‘s possession or, if so, in a powered-on condition enabling their detection.
    II.
    The dispositive issue, then, is whether the use of the cell-site simulator was a
    ―search‖ requiring the police to have obtained a warrant beforehand (in the now-
    conceded absence of exigent circumstances). To answer that question it is enough,
    I believe, to know how the simulator learns of a target cellphone‘s location. It does
    49
    so by effectively commandeering the cellphone as a police investigative tool in the
    way Judge Beckwith describes, namely, by ―actively induc[ing] the phone to
    divulge its identifying information,‖ ante at 17, from which the phone‘s direction
    and distance relative to the simulator can be determined.             This process of
    ―grabbing‖ the target phone and making it the instrument of its own locational
    disclosure explains why the government‘s primary reliance on the third-party
    doctrine of Smith v. Maryland, 
    442 U.S. 735
    (1979)—―Smith . . . is controlling
    here‖ (Appellee‘s Brief at 23)—to argue that appellant had no reasonable
    expectation of privacy in the police‘ use of his phone is unpersuasive.
    Smith held that an individual enjoys no Fourth Amendment protection ―in
    information he voluntarily turns over to [a] third part[y].‖ 
    Id. at 743–44.
    The
    reason is that by ―revealing his affairs to another‖ an individual ―takes the risk . . .
    that the information will be conveyed by that person to the government.‖ United
    States v. Miller, 
    425 U.S. 435
    , 443 (1976). Recently the Fourth Circuit applied the
    third-party doctrine to hold that the government‘s acquisition of historical cell-site
    location information (CSLI) from a suspect‘s cellphone provider is not a search
    under the Fourth Amendment. United States v. Graham, 
    824 F.3d 421
    (4th Cir.
    2016) (en banc). Although that issue remains an open one in this court, and the
    Supreme Court is expected to decide it this term, Carpenter v. United States, No.
    50
    16-402, cert. granted June 5, 2017, Graham‘s analysis at least serves by
    comparison to show why the use of a cell-site simulator to locate appellant‘s phone
    compels a different conclusion.1
    Graham distinguished prior Supreme Court cases involving ―direct
    government surveillance‖ (e.g., United States v. Karo, 
    468 U.S. 705
    (1984); United
    States v. Jones, 
    565 U.S. 400
    (2012)) from the situation where the government
    ―obtains, from a third party, the third party‘s records, which permit the government
    to deduce location 
    information.‖ 824 F.3d at 426
    . Because CSLI is information
    the individual has already ―‗exposed‘ . . . to the phone company‘s ‗equipment in
    the ordinary course of business,‘‖ that person has ―‗assumed the risk‘ that the
    phone company would disclose their information to the government.‖ 
    Id. at 427-
    28 (quoting 
    Smith, 442 U.S. at 744
    ). The government thus ―does not engage in a
    Fourth Amendment ‗search‘ when it acquires‖ CSLI from the cellphone provider.
    
    Id. at 427.
    But in contrast to this passive ―acquir[ing]‖ or ―obtain[ing]‖ of CSLI,
    direct government surveillance of a cellphone does constitute a search, as when —
    the Fourth Circuit observed by footnote — ―the government uses cell-site
    1
    The fact that the Supreme Court will take up cell phone technology in
    relation to the Fourth Amendment is alone reason for us to decide the present issue
    narrowly and not opine in broad stokes about privacy and electronic information,
    locational or other.
    51
    simulators . . . to directly intercept CSLI instead of obtaining CSLI records from
    phone companies.‖ 
    Id. at 426
    n.4
    When the police seek and obtain locational information by directly
    interacting with, indeed by taking functional control of, a suspect‘s cellphone
    through a simulator, it cannot reasonably be said that the phone user has
    ―voluntarily conveyed‖ locational information to anyone and thereby relinquished
    a reasonable expectation of privacy in the information. 
    Smith, 442 U.S. at 744
    .
    Police requests for cellphone location data held by a third party, however the
    Supreme Court resolves that privacy issue, are not comparable to forcing a
    cellphone to disclose its own identifying data. The police located appellant‘s
    phone by effectively making it a self-investigative tool. Any reduced expectation
    of privacy an individual accepts by entering the cellphone world does not extend to
    co-optation of that kind.
    III.
    I also agree that suppression of most of the fruits of the unlawful search here
    will ―pay its way,‖ United States v. Leon, 
    468 U.S. 897
    , 919 (1984), under the
    ―cost-benefit analysis in exclusion cases.‖ Davis v. United States, 
    564 U.S. 229
    ,
    238 (2011). As Judge Beckwith points out, the government has not sought to show
    52
    that any belief the police had that there was no time to pursue a search warrant was
    objectively reasonable, albeit mistaken. The record suggests, to the contrary, that
    the police decided to forgo the warrant process either believing — unreasonably, in
    the virtual absence of relevant court decisions—that no Fourth Amendment
    intrusion was involved or to honor a proprietary agreement for secrecy in using the
    device. See ante at 22 n.26. Thus, the search cannot be said to have involved the
    sort of ―‗isolated,‘ ‗nonrecurring‘ police negligence . . . [that] lacks the culpability‖
    required to justify suppression, 
    Davis, 564 U.S. at 239
    (citing Herring v. United
    States, 
    555 U.S. 135
    , 137 (2009)), even if it entailed no ―‗deliberate,‘ ‗reckless,‘ or
    ‗grossly negligent‘ disregard for Fourth Amendment rights.‖ 
    Davis, 564 U.S. at 238
    . The unlawfulness here was not like the ―err[or] in maintaining records in a
    warrant database,‖ 
    id. at 239,
    involved in both Arizona v. Evans, 
    514 U.S. 1
    (1955), 
    Herring, supra
    ; nor was it comparable to the mistaken but ―objectively
    reasonable reliance on binding judicial precedent‖ in Davis, 564 at 239.
    Exclusion of evidence was thus a proper remedy here, except that, unlike
    Judge Beckwith, I would not decide whether the testimony of Nora Williams
    should have been suppressed. Her testimony was given more than a year after the
    illegal search and only after, now represented by counsel, she had received use
    immunity for her testimony. Those circumstances present a difficult question of
    53
    attenuation that we need not reach, because the admission of the immediate fruits
    of the search was not harmless error and requires reversal. In any new trial the
    parties can brief and the trial court resolve the issue of the admissibility of
    Williams‘ testimony, should the issue arise.
    Finally, I am not persuaded by Judge Thompson‘s position in dissent that no
    Fourth Amendment search took place because appellant had no ―reasonable
    expectation that the location of his cell phone would remain private while he was
    traveling on the public roads with a powered-on, stolen cell phone.‖ Post at 68
    (emphasis added). That contention, resting on appellant‘s presumed awareness of
    how the police might have located him (via the stolen cell phone) but did not,
    closely resembles the inevitable discovery argument we have rejected.           See
    Appellee‘s Supp. Brief at 6 (―[A]ppellant has effectively conceded that the use of a
    cell site simulator to locate the stolen Sprint cell phone would have been a ‗lawful
    investigative process‘‖ (emphasis added)).      Moreover, the theory appears to
    assume a conclusion of wrongdoing—that appellant possessed a ―stolen‖ phone—
    disputed by appellant‘s not-guilty plea at the time the suppression motion was
    litigated.2 It would be unfair to hold that, in moving to suppress the fruits of the
    2
    In McFerguson v. United States, 
    770 A.2d 66
    (D.C. 2001), this court
    rejected the argument that ―society would [not] impute a reasonable expectation of
    (continued…)
    54
    search of his cell phone, appellant assumed the burden of proving that his
    possession of another‘s phone was lawful—the issue of guilty possession vel non
    on which the government would have the burden of proof at trial. The dissent‘s
    ingenious argument for why no search took place is too fraught with difficulty to
    provide a basis for admitting in evidence the fruits of the warrantless manipulation
    of appellant‘s cell phone.
    THOMPSON, Associate Judge, dissenting: My colleagues in the majority are
    ―properly and commendably concerned about the threats to privacy that may flow
    from advances in the technology available to the law enforcement profession.‖ 1 I
    share their concern, but I am not persuaded to their conclusion in this case, which I
    believe rests on a too-generic description of the facts surrounding use of the cell-
    site simulator involved here. My colleagues express concern that ―[a] cell-site
    simulator allows police officers who possess a person‘s telephone number to
    discover that person‘s precise location remotely and at will.‖ Ante at 17. But this
    (…continued)
    privacy to a burglar running away from the crime scene carrying in plain view a
    distinctively marked shopping bag . . . stolen from the burgled residence and filled
    with the victim‘s property.‖ 
    Id. at 71
    (internal quotation marks and ellipses
    omitted). The government‘s argument, we said, ―assumes the very facts that were
    to be proved at trial — that [the defendant] was fleeing with goods he had stolen in
    the burglary.‖ 
    Id. 1 Kyllo
    v. United States, 
    533 U.S. 27
    , 51 (2001) (Stevens, J., dissenting).
    55
    case is about far more particular and narrow facts, and here, as always, Fourth
    Amendment analysis must be ―extremely fact-specific‖;2 ―[i]t is important to be
    clear about what occurred in this case[.]‖3
    Described with the necessary specificity, this case is about the following:
    Police had near real-time cell-site location information from cell phone providers4
    that a cell phone, which police knew (from a review of victim call records) had
    been used by the perpetrator of two recent sexual assaults and related robberies to
    lure his victims, was traveling on the public streets together with a powered-on5
    Sprint cell phone (the ―stolen phone‖) that the perpetrator had stolen from one of
    the robbery victims, and was in the vicinity of the Minnesota Avenue Metro
    2
    In re Application of United States for Historical Cell Site Data, 
    724 F.3d 600
    , 603 (5th Cir. 2013) (internal quotation marks omitted).
    3
    United States v. Jones, 
    565 U.S. 400
    , 404 (2012).
    4
    As the majority opinion notes, ante at 16 n.20, appellant has not argued in
    this appeal that his Fourth Amendment rights were violated when the government
    obtained cell-site location information from cellular providers. See United States
    v. Graham, 
    824 F.3d 421
    , 428 (4th Cir. 2016) (joining other circuit courts in
    holding that ―individuals do not have a reasonable expectation of privacy in
    historical [cell-site location information] that the government obtains from cell
    phone service providers‖).
    5
    Police Technical Services Unit (―TSU‖) Sergeant Perkins testified at the
    suppression hearing in this case that, as long as it‘s ―powered on,‖ a cell phone ―is
    constantly transmitting to and receiving from a tower.‖
    56
    station; and, after driving to the area near that station, law enforcement officers
    using a cell-site simulator (over a period of 30 to 45 minutes) were led to a row of
    cars parked on the street near the Metro station and thence to the sole occupied car,
    in which appellant sat with the stolen cell phone in his possession.6
    I can agree with my colleagues that ―under ordinary circumstances,‖ ante at
    20, the government‘s use of a cell-site simulator to locate an individual through the
    individual‘s cellphone likely violates the legitimate expectation of privacy we all
    have in our location information.7 I would also agree that ―individuals have a
    reasonable expectation of privacy in their location information when they are
    tracked in a space, like the home, that is traditionally protected or when they are
    tracked for a longer period of time and in greater detail than society would expect.‖
    Historical Cell Site 
    Data, 724 F.3d at 608
    (describing a contention by the ACLU).
    But I do not believe it is fair to regard the particular circumstances of this case,
    which I have described above, as ―ordinary circumstances.‖ And as the facts of
    6
    Actually, at the time appellant was arrested, he had in his car all four
    stolen cell phones involved in this case.
    7
    I acknowledge that some courts have so held. See, e.g., United States v.
    Ellis, No. 13-CR-00818 PJH, 
    2017 U.S. Dist. LEXIS 136217
    , *20 (N.D. Cal. Aug.
    24, 2017) (―[C]ell phone users have an expectation of privacy in their cell phone
    location in real time and . . . society is prepared to recognize that expectation as
    reasonable.‖).
    57
    this case (1) do not involve the privacy of the home;8 (2) did not entail long-term
    tracking that could reveal appellant‘s private information about the places he
    frequents;9 (3) did not entail a physical intrusion or a physical trespass to any
    8
    That fact distinguishes this case from cell-site simulator cases on which
    appellant relies. See State v. Andrews, 
    134 A.3d 324
    (Md. Ct. Spec. App. 2016),
    and United States v. Lambis, 
    197 F. Supp. 3d 606
    , 609 (S.D.N.Y. 2016). In
    Andrews, police used a cell-site simulator to locate Andrews, who was wanted on
    charges of attempted murder, and tracked him to a location inside a residence,
    where he was 
    arrested. 134 A.3d at 326
    . The court cited its concern that the cell-
    site simulator had ―been used to obtain information about the contents of a home,
    not otherwise discernable without physical intrusion.‖ 
    Id. at 349.
    The court stated
    that ―people have a reasonable expectation that their cell phones will not be used as
    real-time tracking devices by law enforcement‖ and ―an objectively reasonable
    expectation of privacy in real-time cell phone location information.‖ 
    Id. at 327.
    In
    Lambis, the Drug Enforcement Administration used a cell-site simulator to locate
    Lambis‘s apartment, conduct that the court found to be an unreasonable search
    because ―[t]he home has special significance under the Fourth 
    Amendment.‖ 197 F. Supp. 3d at 609
    –10. These cases are consistent with the principle that, ―[w]ith
    few exceptions, the question whether a warrantless search of a home is reasonable
    and hence constitutional must be answered no.‖ 
    Kyllo, 533 U.S. at 31
    (observing
    that ―[a]t the very core of the Fourth Amendment stands the right of a man to
    retreat into his own home and there be free from unreasonable governmental
    intrusion‖ (internal quotation marks omitted)).
    In this case, the cell-site simulator alerted the officers that appellant‘s phone
    was located in the 4000 block of Minnesota Avenue, N.E., a block on which there
    were several businesses, a District of Columbia government building, and a Metro
    station. There appears to be no evidence in the record that there were residential
    buildings in the block, but amici note that a large apartment building is also located
    on the block, at 4020 Minnesota Avenue. There appears to be no evidence in the
    record that the cell-site simulator came within range of that apartment building as
    the officers were ―coming down southbound Minnesota [Avenue].‖
    9
    See 
    Graham, 824 F.3d at 435
    (noting that in Jones, ―the concurring
    justices recognized a line between ‗short-term monitoring of a person‘s movements
    (continued…)
    58
    property of appellant;10 and (4) did not involve a search of the contents of
    (…continued)
    on public streets,‘ which would not infringe a reasonable expectation of privacy,
    and ‗longer term GPS monitoring,‘ which would‖ (quoting 
    Jones, 565 U.S. at 430
    )). The concern is that long-term historic location information can reveal ―a
    wealth of detail about [an individual‘s] familial, political, professional, religious,
    and sexual associations.‖ 
    Jones, 565 U.S. at 415
    (Sotomayor, J., concurring); 
    id. at 430
    (Alito, J., concurring in judgment) (―[T]he use of longer term GPS monitoring
    [over a period of twenty-eight days in Jones‘s case] in investigations of most
    offenses impinges on expectations of privacy.‖); cf. United States v. Riley, 
    858 F.3d 1012
    , 1013 (6th Cir. 2017) (tracking of fugitive‘s real-time GPS location data
    for approximately seven hours did not amount to a Fourth Amendment search).
    10
    A trespassory search implicating the Fourth Amendment occurs when the
    government ―gains evidence by physically intruding on constitutionally protected
    areas.‖ Florida v. Jardines, 
    569 U.S. 1
    , 16 (2013).
    Appellant and the majority opinion cite cases suggesting that use of a cell-
    site simulator could constitute trespass to chattels, ante at 24–25 n.27, but my
    colleagues do not rely on that case law for their conclusion. Moreover, as Justice
    Alito noted in his concurrence in the judgment in Jones, ―today there must be some
    actual damage to the chattel before [an] action [for trespass to chattels] can be
    
    maintained.‖ 565 U.S. at 419
    n.2 (Alito, J., concurring in judgment) (internal
    quotation marks omitted); see also Restatement (Second) of Torts § 218 cmt. (e)
    (1965) (stating that, generally, ―one who intentionally intermeddles with another‘s
    chattel is subject to liability only if his intermeddling is harmful to the possessor‘s
    materially valuable interest in the physical condition, quality, or value of the
    chattel, or if the possessor is deprived of the use of the chattel for a substantial
    time‖). If arguendo use of the cell-site simulator in this case (which, according to
    the evidence, may have caused calls that appellant tried to initiate to be dropped)
    did constitute a trespass, I do not believe we could reasonably conclude that the
    police were culpable in failing to recognize it as such (and thus I believe we would
    have no occasion to apply the exclusionary rule). See Herring v. United States,
    
    555 U.S. 135
    , 141, 143 (2009) (confirming that ―exclusion has always been our
    last resort, not our first impulse‖ and that the Court has ―never suggested that the
    exclusionary rule must apply in every circumstance in which it might provide
    marginal deterrence,‖ and stating that ―[t]he extent to which the exclusionary rule
    (continued…)
    59
    appellant‘s cell phone that could have exposed his private information,11 I am
    unpersuaded that there was a Fourth Amendment violation in this case.
    In the pages that follow, I will explain my reasoning in more detail. But
    first, I must address a preliminary issue.
    I.
    After oral argument in this matter, this court directed the parties to submit
    supplemental briefs on the following issue:
    What reasonable and legitimate expectation of privacy
    (…continued)
    is justified . . . varies with the culpability of the law enforcement conduct.‖)
    (internal quotation marks omitted). And, as discussed infra, even if police
    interfered with the operation of appellant‘s ―chattel‖ when the cell-site simulator
    ―grabbed‖ his cell phone remotely and rendered it temporarily non-operational for
    making calls, police were justified in effecting that seizure of appellant‘s cell
    phone under the automobile exception to the warrant requirement.
    11
    ―[C]oncerns about a general ‗erosion of privacy‘ with respect to cell
    phones . . . revolve around protecting the large quantity of information stored on
    modern cell phones and on remote servers like the ‗cloud.‘ If all that information
    were indeed at risk of disclosure [through the government‘s obtaining cell-site
    location information], we would share this concern.‖ 
    Graham, 824 F.3d at 434
    n.13 (internal citation omitted). Documents, however, ―stored on phones and
    remote servers are protected, as ‗content,‘ in the same way that the contents of text
    messages or documents and effects stored in a rented storage unit or office are
    protected.‖ 
    Id. 60 does
    a person have in his or her location information
    when the person possesses (outside his or her residence)
    a stolen cell phone capable of being located by a cell-site
    simulator or through real-time cell site location
    information available to the cell phone owner or his or
    her telecommunications provider?
    Asserting that the issue the court raised was waived by the government,
    appellant argues in his supplemental brief that ―waiver rules preclude this court
    from affirming the trial court‘s ruling on an alternative ground that the government
    did not raise at trial or on appeal.‖ I disagree in the strongest terms.12 Fourth
    Amendment suppression issues are serious issues.          In this case, the evidence
    sought to be suppressed relates to serial sexual assaults and robberies at knifepoint
    (with use of a knife that the assailant — confirmed by DNA evidence to be
    appellant — was still carrying on his person at the time he was stopped by police).
    We have a duty to analyze for ourselves the antecedent question of whether, on the
    12
    Appellant is also incorrect in suggesting that the court directed briefing
    on an issue entirely absent from the government‘s initial brief in this court and its
    arguments in the trial court. The government argued in its opening brief to us that
    in cases cited by appellant, ―the cell-site simulator located the defendant‘s phone
    inside a home, thus implicating Fourth Amendment privacy concerns not raised
    here.‖ Our inquiry about the significance of the fact that appellant possessed the
    stolen cell phone outside his residence reflected in part that argument. Our inquiry
    also reflected the prosecutor‘s repeated argument (to which she mistakenly referred
    as involving application of the ―inevitable discovery‖ doctrine) to the trial court
    that suppression was not warranted because there was ―a separate, lawful way
    [police] could have gotten to the same thing‖ (emphasis added) — i.e., use of the
    cell-site simulator to target the stolen cell phone that was traveling with appellant‘s
    phone.
    61
    particular facts of this case, use of the technology by which appellant was located
    constituted a search (and, if so, whether it was a lawful search). In this case as
    always, this court‘s task is to ―consider[] the briefs and the oral argument, and [to]
    test[] them against the record and the law,‖ Watson v. United States, 
    536 A.2d 1056
    , 1068 (D.C. 1987) (en banc), not merely to choose the better or best of the
    arguments presented in support of a claim. Our responsibility as an appellate court
    is to decide cases in accordance with the law, and that responsibility is not to be
    diluted by how counsel have framed the issues or by limitation to the specific
    authorities counsel have cited.
    The Supreme Court‘s decision in United States National Bank of Oregon v.
    Independent Insurance Agents of America, Inc., 
    508 U.S. 439
    (1993), is
    instructive. That litigation commenced after the Comptroller of the Currency
    issued a ruling allowing the United States National Bank of Oregon ―to sell
    insurance through its branch in Banks, Oregon.‖ 
    Id. at 443.
    Trade organizations
    challenged the Comptroller‘s decision, arguing, inter alia, that it was inconsistent
    with section 92, a statutory provision enacted in 1916 that ―permit[ted] banks
    located in small communities to sell insurance to customers outside those
    communities.‖ 
    Id. at 441,
    444. The District Court granted summary judgment in
    favor of the Comptroller, finding that ―the Comptroller‘s interpretation was
    62
    rational and consistent with section 92.‖ 
    Id. at 444
    (internal quotation marks and
    alterations omitted). On appeal, the trade organizations did not ask the Court of
    Appeals for the District of Columbia to rule that section 92 no longer existed (it
    had been repealed in 1918), and they did not take a position on the issue during
    oral argument or in supplemental briefing. Nevertheless, reasoning that it had ―a
    ‗duty‘ to [decide the issue],‖ the Court of Appeals determined that section 92 had
    been repealed. 
    Id. at 444
    -45 (quoting Indep. Ins. Agents of America, Inc. v. Clarke,
    
    955 F.2d 731
    , 734 (D.C. Cir. 1992)).
    The case went to the Supreme Court, which concluded that ―[t]he Court of
    Appeals . . . had discretion to consider the validity of section 92,‖ and ―did not
    stray beyond its constitutional or prudential boundaries‖ in doing so. 
    Id. at 447.
    The Court explained that ―[t]hough the parties did not lock horns over the status of
    section 92, they did clash over whether the Comptroller properly relied on section
    92 as authority for his ruling,‖ and the Court of Appeals was not obliged ―to treat
    the unasserted argument that section 92 had been repealed as having been waived.‖
    
    Id. at 446-47.
    The Court confirmed that ‗―when an issue or claim is properly
    before the court, the court is not limited to the particular legal theories advanced by
    the parties, but rather retains the independent power to identify and apply the
    proper construction of governing law.‖‘ 
    Id. at 446
    (internal alterations omitted)
    63
    (quoting Kamen v. Kemper Fin. Servs, Inc., 
    500 U.S. 90
    , 99 (1991)). The Court
    further instructed that ―a court may consider an issue ‗antecedent to and ultimately
    dispositive of‘ the dispute before it, even an issue the parties fail to identify and
    brief.‖ 
    Id. at 446
    -47 (internal alterations omitted) (quoting Arcadia v. Ohio Power
    Co., 
    498 U.S. 73
    , 77 (1990)).
    Our court has applied the guidance of National Bank of Oregon in various
    circumstances. For example, in Martin v. United States, 952 A.2d 181(D.C. 2008),
    after requesting supplemental briefs from the parties, we reached the question of
    whether the police had unlawfully entered Martin‘s home in violation of the Fourth
    Amendment, even though ―appellate counsel [had] failed to argue that the entry
    itself constituted an unlawful search either in his principal brief or at oral
    argument.‖ 
    Id. at 188–89.13
    Our sister court, the United States Court of Appeals
    13
    See also Anthony v. United States, 
    935 A.2d 275
    , 282 n.10 (D.C. 2007)
    (―But no matter whose ox is gored when the parties are directed by the court to file
    supplemental submissions, ‗this court has frequently requested post-argument
    briefing of issues not adequately raised by counsel, to the end that, after both
    parties have been fully heard, the court is in the best position to render a sound
    decision.‘‖ (quoting Randolph v. United States, 
    882 A.2d 210
    , 226 (D.C. 2005));
    Outlaw v. United States, 
    632 A.2d 408
    , 410–11 (D.C. 1993) (declining to reach the
    question briefed by the parties — ―whether one may be convicted of being an
    accessory after the fact to murder on the basis of actions taken while the decedent
    was still alive‖ — and instead, after requesting and receiving supplemental
    briefing, ruling based on an issue the panel raised for the first time at oral argument
    — ―whether the evidence was sufficient to support [appellant‘s] conviction of
    (continued…)
    64
    for the District of Columbia Circuit, has also considered the merits of issues the
    parties did not raise. See United States v. Maynard, 
    615 F.3d 544
    , 560–61 (D.C.
    Cir. 2010) (―The Government does not separately raise, but we would be remiss if
    we did not address, the possibility that although the whole of Jones‘s movements
    during the month for which the police monitored him was not actually exposed to
    the public, it was constructively exposed because each of his individual
    movements during that time was itself in public view.‖).14
    (…continued)
    [accessory after the fact] to any offense whatever‖); cf. 
    Randolph, 882 A.2d at 217
    –18 (‗―Once a claim is properly presented to the trial court, a party can make
    any argument in the appellate court in support of that claim[, and] parties are not
    limited to the precise arguments made below.‖‘ (internal alterations omitted)
    (quoting West v. United States, 
    710 A.2d 866
    , 868 n.3 (D.C. 1998)); see also 
    id. at 227
    (determining that ―the judgment should be affirmed on harmlessness grounds,
    notwithstanding the government‘s initial failure to argue that the trial court‘s error
    was harmless‖).
    14
    See also Lesesne v. Doe, 
    712 F.3d 584
    , 588 (D.C. Cir. 2013) (noting that
    the Supreme Court ―has recognized that ‗there may always be exceptional cases or
    particular circumstances which will prompt a reviewing or appellate court, where
    injustice might otherwise result, to consider questions of law which were neither
    pressed nor passed upon by the court or administrative agency below,‖‘ and
    determining that ―the proper interpretation of [the Prison Litigation Reform Act‘s]
    exhaustion requirement is a dispositive legal issue antecedent to its application‖
    (internal alterations omitted) (quoting Hormel v. Helvering, 
    312 U.S. 552
    , 557
    (1941))); United States v. Pryce, 
    938 F.2d 1343
    , 1348 (D.C. Cir. 1991) (―Only if
    one adopts an absolutist approach to the adversary system can one contend that
    courts must never address unargued issues, no matter how obvious their proper
    resolution may be. Certainly the Supreme Court rejects such an approach.‖).
    65
    In short, case law does not bind us to the approach of addressing only the
    arguments the parties have framed.       The Supreme Court has not followed or
    dictated that approach,15 our neighbor the United States Court of Appeals for the
    District of Columbia Circuit has rejected it, and numerous other federal circuit
    courts of appeals have said that they have discretion on direct appeal to consider
    arguments a party has failed to make.16 The bottom line is that appellate courts
    ―regularly and frequently consider sua sponte authorities not cited and grounds of
    decision not raised.‖17
    15
    Commentators have frequently mentioned that in Erie Railroad Co. v.
    Tompkins, 
    304 U.S. 64
    (1938), the issue the Court resolved — whether ―in
    diversity cases the substantive law of the state of trial must be applied‖ — ―had not
    been raised by the parties before either the lower courts or the Supreme Court.‖
    Albert Tate, Jr., Sua Sponte Consideration on Appeal, 9 TRIAL JUDGES J. 68
    (1970), reprinted in APPELLATE JUDICIAL OPINIONS 128 (Robert A. Leflar ed.,
    1974); see also Singleton v. Wulff, 
    428 U.S. 106
    , 121 (1976) (―The matter of what
    questions may be taken up and resolved for the first time on appeal is one left
    primarily to the discretion of the courts of appeals, to be exercised on the facts of
    individual cases. We announce no general rule.‖).
    16
    See, e.g., United States v. Rose, 
    104 F.3d 1408
    , 1414 (1st Cir. 1997) (―We
    join several other circuit courts of appeals in holding that appellate courts have the
    discretion on direct appeal to overlook the government‘s failure to argue that the
    admission of the challenged evidence, if error, was harmless, and that appellate
    courts may therefore consider the issue of harmlessness sua sponte.‖) (collecting
    cases).
    17
    Albert Tate, Jr., supra note 15, at 127; see also Estate of Girard v. Laird,
    
    621 A.2d 1265
    , 1268 n.3 (Vt. 1993) (citing the Tate article in explaining why the
    court may ―reach[] results for reasons different than those argued by the parties‖);
    State v. Weber, 
    471 N.W.2d 187
    , 199 n.7, 200 (Wis. 1991) (citing the Tate article
    (continued…)
    66
    When we review denials of motions to suppress, ―our role is [essentially] to
    ensure that the trial court had a substantial basis for concluding that no
    constitutional violation occurred.‖ Brown v. United States, 
    590 A.2d 1008
    , 1020
    (D.C. 1991). ―We must determine whether the court‘s denial of the motion to
    suppress is sustainable under any reasonable view of the evidence,‖ and ―[i]t is
    well settled that [we] may affirm a decision for reasons other than those given by
    the trial court.‖ Alston v. United States, 
    518 A.2d 439
    , 440 n.2 (D.C. 1986). Thus,
    in this case, we have a duty to study carefully the particular facts of the case to
    determine for ourselves whether the trial court‘s denial of appellant‘s motion to
    suppress is sustainable.   This means that we have not only the discretion to
    consider, but an obligation to consider whether appellant had a reasonable and
    legitimate expectation of privacy in his location information when (as the
    supplemental briefing order described and among other material facts discussed
    below) he ―possesse[d] (outside his . . . residence) a stolen cell phone capable of
    being located by a cell-site simulator or through real-time cell-site location
    information available to the cell phone owner or his . . . telecommunications
    provider.‖
    (…continued)
    in justifying its decision upholding the reasonableness of a search under the Fourth
    Amendment on grounds that, according to the dissenting justice, the State ―was
    aware of . . . but did not argue . . . in this court‖).
    67
    As explained in the discussion below, ―the antecedent question of whether
    there [wa]s a Fourth Amendment ‗search‘ at all‖18 turns on resolution of that issue
    (which, on the facts presented here, is ultimately dispositive of the case). And
    even if arguendo use of the cell-site simulator constituted a ―search‖ for Fourth
    Amendment purposes, application of the automobile exception to the Fourth
    Amendment warrant requirement requires affirmance of the trial court‘s denial of
    the motion to suppress.
    II.
    The Fourth Amendment protects ―[t]he right of the people to be secure in
    their persons, houses, papers, and effects, against unreasonable searches and
    seizures.‖ U.S. Const. amend. IV. Thus, in analyzing a Fourth Amendment claim,
    the threshold issue is whether there has been a ―search‖ or ―seizure.‖          That
    ―antecedent question whether or not a Fourth Amendment ‗search‘ has occurred is
    not so simple under [Supreme Court] precedent.‖ 
    Kyllo, 533 U.S. at 31
    . The
    fundamental principle, however, is that ―a Fourth Amendment search does not
    occur . . . unless the individual manifested a subjective expectation of privacy in
    the object of the challenged search, and society is willing to recognize that
    18
    Riverdale Mills Corp. v. Pimpare, 
    392 F.3d 55
    , 63 (1st Cir. 2004).
    68
    expectation as reasonable.‖ 
    Id. at 33
    (internal quotation marks and alterations
    omitted). ―[W]hether an expectation of privacy is reasonable depends in large part
    upon whether that expectation relates to information that has been ‗exposed to the
    public.‘‖ 
    Maynard, 615 F.3d at 558
    (internal alterations omitted) (quoting Katz v.
    United States, 
    389 U.S. 347
    , 351 (1967)). ―In considering whether something is
    ‗exposed‘ to the public as that term was used in Katz[,] we ask not what another
    person can physically and may lawfully do but rather what a reasonable person
    expects another might actually do.‖ 
    Id. at 559.
    A. Appellant had no reasonable expectation of privacy in his location
    while he was on the public roads with the powered-on, stolen cell
    phone.
    It appears that police used the cell-site simulator to locate appellant‘s phone
    rather than the stolen phone. However, appellant‘s expectation of privacy with
    respect to the location of his phone need not come into play in our resolution of
    this case because appellant exposed that location to discovery by being on the
    public roads with both his phone and the powered-on, stolen cell phone. Even if
    appellant generally had a subjective expectation that information about his cell
    phone‘s location would be private, he could not have had a reasonable expectation
    that the location of his cell phone would remain private while he was traveling on
    the public roads with a powered-on, stolen cell phone.
    69
    The sexual assaults and robberies in this case occurred in 2013. Well before
    that time, Apple had introduced the Find My iPhone application (―app‖). See In re
    J.A., No. A-1624-14T2, 2016 N.J. Super. Unpub. LEXIS 430, *11 n.3 (Super. Ct.
    App. Div. Feb. 29, 2016) (noting that ―Apple introduced the Find My iPhone
    feature in 2011‖ and that, in that case, the Find My iPhone app ―allowed police to
    track J.A. by following the stolen iPhone‘s signal to the Shelbourne Lane address
    within minutes of the robbery‖). And indeed in this case, one of the detectives
    working on the case, Detective Rachel Pulliam, testified that she had ―one of the
    complainant‘s information in [her] phone as well [as] in the Find My iPhone app‖
    (and thus was able to ―get a general idea of where‖ she would be going to meet the
    TSU officers who had located appellant through use of the cell-site simulator). It
    appears that the detective was referring to her ability to use the Find My iPhone
    app in an effort to locate the Apple iPhone 4S cell phone stolen from the woman
    the police referred to as complainant number one‘s cousin (who was robbed but not
    sexually assaulted at the end of the first of the two incidents involved in this case).
    As it happened, police in this case tracked the stolen Sprint phone and not that
    iPhone, but case law is replete with references to iPhone owners or law
    enforcement officers locating stolen iPhones by using the Find My iPhone app in
    2013 or earlier years.19 The facts caution against assuming that the Find My
    19
    See, e.g., People v. Easton, No. H041704, 2017 Cal. App. Unpub. LEXIS
    (continued…)
    70
    iPhone app or similar find-my-device apps always pinpoint an address or do so
    (…continued)
    644, *5 (Jan. 30, 2017) (―Using the Find My iPhone application [in 2012], police
    recovered Casey‘s cell phone from a recycling bin in front of a residence in Santa
    Clara within a few blocks of defendant‘s residence.‖); State v. Copes, No. 84, 2017
    Md. LEXIS 478, *5 n.4 (July 28, 2017) (citing a November 2011 publication
    entitled ―How to Use Find My iPhone to Get Your Stolen iPhone Back‖); People v.
    Foy, 
    199 Cal. Rptr. 3d 208
    , 212 (Ct. App. 2016) (―Wang had an application on his
    iPhone called ‗Find My iPhone,‘ which he used [in 2011] at the suggestion of
    police to track Song‘s stolen iPhone. Wang‘s phone displayed a map indicating
    that Song‘s phone was located at 603 Grant Street[.]‖); People v. Robinson, No.
    3268/2013, 2016 N.Y. Misc. LEXIS 652, * 3, (App. Div. Feb. 24, 2016) (―As they
    were driving [in 2013], the ‗Find My iPhone‘ tracker showed the [stolen] phone to
    be moving. The movement stopped at East 120th Street and First Avenue in
    Manhattan.‖); People v. Snyder, No. B265391, 2016 Cal. App. Unpub. LEXIS
    8230, *2 (Nov. 16, 2016) (―Using another device‘s ‗find my iPhone‘ feature [in
    2013], Jordyn tracked her iPhone‘s location to the Mentor Court residence.‖);
    People v. Scales, No. B260902, 2016 Cal. App. Unpub. LEXIS 1942, *7-8 (Mar.
    17, 2016) (―[A] Los Angeles Police Department . . . Officer . . . used a ‗Find My
    iPhone App‘ [in 2012] to locate Schulz‘s cell phone that had been taken during the
    robbery events. It was found on the side of the 10 Freeway about two miles away
    from the Green Path building.‖); Adams v. State, No. 1142, 2016 Md. App. LEXIS
    457, *3 n.3 (Ct. Spec. App. Feb. 5, 2016) (―Because Myers‘ cell phone was inside
    his [stolen] vehicle, police [in 2013] were able to locate the car by tracking the
    phone by use of the ‗find my iPhone‘ application.‖); Commonwealth v. Gil, No.
    566-EDA-2014, 2015 Pa. Super. Unpub. LEXIS 3695, *2 (Feb. 10, 2015) (―After
    the victim reported the robbery [in 2012], the police tracked the iPhone, through a
    ‗Find My iPhone‘ mobile application, to a house on Washington Street.‖); State v.
    Coleman, No. W2012-00880-CCA-R3-CD, 2013 Tenn. Crim. App. LEXIS 573, *3
    (June 10, 2013) (―Mr. Petty recalled that there was an application on his wife‘s
    phone called ‗Find My iPhone.‘ Mr. Petty was able to use his computer to track
    the phone‘s location to a general vicinity of Division and Waddell Street.‖); Pirozzi
    v. Apple, Inc., 
    966 F. Supp. 2d 909
    , 915 (N.D. Cal. 2013) (quoting a statement
    from Apple‘s website that ―In the event your iPhone is lost or stolen, Find My
    iPhone allows you to locate it on a map[.]‖); United States v. Flores-Lopez, 
    670 F.3d 803
    , 808 (7th Cir. 2012) (referring to the Find My iPhone app).
    71
    accurately,20 or that the only method officers used in the reported cases to locate
    the stolen phones was such an app (and not, for example, the app supplemented
    with use of a cell-site simulator). But the relevant point is that, in 2013, the public
    had reason to know that, because of ―the ubiquity of . . . apps,‖21 it was quite
    possible for a stolen cell phone to be tracked with precision, even if such efforts
    were not always successful.
    Further, even aside from the apps available to cell phone owners, cellular
    service providers have long been able to supply cell phone locational data in close
    to real-time,22 and, as at least one court observed in 2010, the providers‘
    capabilities were increasing.23 In 2013, it would have been reasonable to expect
    20
    Detective Pulliam testified that the Find My iPhone app showed her
    ―[not] an exact, pinpointed location‖ but, at one point, ―a general area . . . in
    southeast‖ (perhaps the area of the District into which the phones traveled when,
    according to other evidence, they left Capitol Heights, Maryland, and headed
    toward Kenilworth Avenue).
    21
    Commonwealth v. Wilson, No. 15-P-851, 2016 Mass App. Unpub. LEXIS
    466, *3 (Apr. 29, 2016).
    22
    The evidence in this case showed that the police TSU received updated
    location information from the cellular service providers at least every fifteen
    minutes (every five minutes for the stolen Sprint phone), with only a one-to-three-
    minute lag time.
    23
    The following observations made by that court in 2010 are notable:
    ―Neither the user nor the carrier can predict how precise the next location data will
    be. For a typical user, over time, some of that [location] data will likely have
    (continued…)
    72
    that the owner of the stolen cell phone might try to locate it by obtaining cell-site
    location information from her cellular service provider. Surely ―[t]he availability
    and use of [the foregoing] and other new devices . . . shape the average person‘s
    expectations about the privacy of‖ cell phone movements and location. 
    Jones, 565 U.S. at 429
    (Alito, J., concurring in judgment).24 Further, it was reasonable to
    expect that the owner of the stolen cell phone would seek help from the police and
    put in motion their efforts, with whatever cell-site location information and devices
    were at their disposal, to locate the stolen phone. As police TSU Sergeant Perkins
    testified, with the cell phone simulator, ―either one [i.e., the stolen phone or
    appellant‘s phone] would have got us to the area [where they found appellant in his
    (…continued)
    locational precision similar to that of GPS‖; ―Emerging versions of the technology
    are even more precise‖; ―[T]he tech-savvy user may now understand that there is a
    risk that the provider can calculate and record his location and movements very
    precisely.‖ In re Application for United States for Historical Cell Site Data, 747 F.
    Supp. 2d 827, 833-34, 845 (S.D. Tex. 2010), rev’d on other grounds, 
    724 F.3d 600
    (5th Cir. 2013).
    24
    Such considerations led the Second Circuit to observe that ―any
    expectation of privacy that [the defendant] had in his cell-phone location [tracked
    over a less-than-two-hour period] was dubious at best.‖ United States v.
    Caraballo, 
    831 F.3d 95
    , 105 (2d Cir. 2016). See generally United States v.
    Wheeler, 
    169 F. Supp. 3d 896
    , 908 (E.D. Wis. 2016) (noting that ―[t]he media is
    rife with information — and sometimes warnings — about the fact that one‘s
    location can be tracked from one‘s cell phone‖).
    73
    car].‖25
    By traveling with the stolen cell phone that was susceptible to all the
    foregoing find-the-phone methods and devices, appellant exposed his location, too.
    I therefore find it impossible to conclude that appellant could reasonably have
    expected that his movements and location with the stolen phone in his possession
    would be private (and thus that he had an ―expectation of privacy in his phone‘s
    location‖). Moreover, if appellant had such an expectation, I suspect that it is not
    one that society is prepared — and in my view it is not one that we should be
    prepared26 — to recognize as reasonable. To be sure, our cell phones play such a
    central role in our lives and contain so much of our personal data that we must be
    vigilant about protecting against government intrusions into cell phone privacy.
    But the other side of that coin is that — I strongly suspect — a great many people
    who have had a cell phone stolen or who fear such a theft are likely to have a
    25
    Appellant suggests that the evidence indicated that the cell-site simulator
    did not work with the stolen cell phone, but the trial court declined to so find. The
    court found instead that if the TSU officers ―had . . . switched over . . . to use the
    Sprint number instead, . . . they would have eventually gotten to the exact same
    place because the phones were together.‖
    26
    I have in mind the caution that where we may have been ―‗conditioned‘
    by influences alien to the well-recognized Fourth Amendment freedoms, a
    normative inquiry may be necessary to align‖ what we are prepared to recognize as
    legitimate privacy interests ―with the protections guaranteed in the Fourth
    Amendment.‖ Tracey v. State, 
    152 So. 3d 504
    , 525–26 (Fla. 2014).
    74
    strong desire to recover their stolen phones and to be unwilling to recognize as
    legitimate the locational-privacy interest of a person who is traveling the streets
    with a stolen phone.27 I am not the first to observe that ―many people may find the
    tradeoff [between electronic tracking technology and some diminution of privacy]
    as worthwhile.‖ 
    Jones, 565 U.S. at 427
    (Alito, J., concurring in judgment).
    To be clear, the analysis above does not rely on the inevitable-discovery
    27
    My conclusion that appellant was traveling with a stolen phone as to
    which he had no locational-privacy interest does not depend on the jury verdict that
    he was the thief, i.e., the perpetrator of the robberies. Cf. Godfrey v. United States,
    
    414 A.2d 214
    , 214 (D.C. 1980) (―The real question is whether the [proponent of a
    motion to suppress] can be deemed to have a legitimate expectation of privacy in
    the thing or area searched and the item seized without reference to‖ an
    ―unfortunate pretrial connotation that the proponent of the motion to suppress is
    guilty.‖) Rather it rests on the evidence presented at the suppression hearing that,
    when arrested, appellant had with him in his car all four stolen phones as well as
    the phone used by the perpetrator of the robberies and sexual assaults. (Unlike the
    defendant in McFerguson v. United States, 
    770 A.2d 66
    (D.C. 2001) — a case
    Judge Farrell suggests is apposite, ante at 53 n.2 — appellant was not ―a street
    pedestrian [with] a reasonable expectation of privacy in covered objects associated
    with his person,‖ 
    id. at 71).
    I believe we can say with confidence that even if
    appellant had disputed at the suppression hearing that he knew that the victims‘
    (four) phones found in his possession had been stolen and had attempted to show
    that he had a legitimate possessory interest in and expectation of privacy with
    respect to the stolen Sprint phone, he would not have been able to carry his burden
    of so demonstrating. See Rakas v. Illinois, 
    439 U.S. 128
    , 130 n.1 (1978) (―The
    proponent of a motion to suppress has the burden of establishing that his own
    Fourth Amendment rights were violated by the challenged search or seizure.‖);
    Morton v. United States, 
    734 A.2d 178
    , 182 (D.C. 1999) (referring to defendant‘s
    ―burden of showing that he had a protectible interest‖).
    75
    doctrine to conclude that use of the cell-site simulator was lawful. As the majority
    opinion notes, the inevitable-discovery doctrine ―shields illegally obtained
    evidence from the exclusionary rule if the government can show, by a
    preponderance of the evidence, that the evidence ‗ultimately or inevitably would
    have been discovered by lawful means.‘‖ Gore v. United States, 
    145 A.3d 540
    ,
    548 (D.C. 2016) (quoting Hicks v. United States, 
    730 A.2d 657
    , 659 (D.C. 1999)).
    The inevitable-discovery doctrine thus requires proof that a presumably lawful
    search process was actually underway; here, at least arguably, that would have
    entailed at a minimum having entered the pertinent number of the stolen cell phone
    (which police had obtained) into the cell-site simulator. There was some evidence
    that the TSU officers did that, but, in the trial court‘s view, not enough such
    evidence to enable the government to prove by a preponderance of the evidence
    that the officers used the cell-site simulator to find the stolen phone rather than
    appellant‘s phone.    However, for purposes of my analysis focused on what
    appellant could reasonably have expected others to do, I have properly relied on
    what the police could have done with respect to the stolen cell phone (or, it
    appears, with respect to the cousin‘s stolen iPhone) that would have enabled them
    to locate appellant and his phone.
    United States v. Gbemisola, 
    225 F.3d 753
    (D.C. Cir. 2000), illustrates the
    76
    point. There, law enforcement agents had installed and subsequently monitored an
    electronic tracking device in a package addressed to the defendant, which enabled
    the agents to know if and when the defendant opened the package — which he did
    while riding in the back of a taxicab. 
    Id. at 756.
    Noting that the agents did not see
    when the box was opened, the D.C. Circuit concluded that no warrant was required
    for their use of the electronic device that reported when the box was opened
    because the ―decisive issue . . . [was] not what the officers saw but what they could
    have seen.‖ 
    Id. at 759
    (emphasis added). ―At any time, the surveillance vehicle
    could have pulled alongside of the taxi and the officers could have watched
    Gbemisola through its window. Indeed, the taxi driver himself could have seen the
    event simply by looking in his rear-view mirror or turning around.‖ Id.; see also
    
    Maynard, 615 F.3d at 560
    (―[I]t was not at all unlikely Gbemisola would be
    observed opening a package while seated in the rear of a taxi[.]‖). Thus, the fact
    that the agents learned what they learned through an electronic device (one
    presumably not generally available to members of the public) was not the
    important factor; the important factor was that they, or someone else, could have
    learned that the defendant opened the package through lawful means.28
    28
    It might be suggested that the analysis in Gbemisola is a straightforward
    application of the Supreme Court‘s ruling in United States v. Knotts, 
    460 U.S. 276
                                                                          (continued…)
    77
    The same point applies here.        Again, police TSU Sergeant Perkins‘s
    testimony (and the trial court‘s finding) was that, with the cell-cite simulator,
    ―either [phone] would have got[ten them] to [where they found appellant in his
    car].‖ In other words, officers could have found appellant‘s location through use
    of the cell-site simulator targeted at the stolen cell phone that was in his vehicle
    (the lawfulness of which approach appellant does not challenge, and likely has no
    (…continued)
    (1983), about the lawfulness of use of a monitoring device that reveals no more
    than could be seen by visual surveillance. See 
    id. at 282–84
    (holding that the
    officers‘ conduct in monitoring signals from a beeper they had installed in a
    container the defendant subsequently placed in his car did not invade any
    legitimate expectation of privacy and did not constitute a Fourth Amendment
    search since the beeper surveillance revealed no more than could have been visible
    to the naked eye as the car traveled the public highway and raised no constitutional
    issues that visual surveillance would not also raise); see also United States v. Karo,
    
    468 U.S. 705
    , 714 (1984) (―[T]he monitoring of a beeper in a private residence, a
    location not open to visual surveillance, violates the Fourth Amendment rights of
    those who have a justifiable interest in the privacy of the residence.‖) (emphasis
    added). However, the Supreme Court‘s decision in Bond v. United States, 
    529 U.S. 334
    (2000), makes clear that what an individual exposes to the public is not
    limited to what can be learned through visual perception (outside a residence), but
    also includes what members of the public may be able to discern through
    predictable tactile actions. See 
    id. at 338
    (―When a bus passenger places a bag in
    an overhead bin, he expects that other passengers or bus employees may move it
    for one reason or another. Thus, a bus passenger clearly expects that his bag may
    be handled‖ and ―exposed to certain kinds of touching and handling.‖). I see no
    reason why the analysis of whether something is exposed to the public based on
    ―what a reasonable person expects another might actually do,‖ 
    Maynard, 615 F.3d at 559
    , should not include as well the find-my-stolen-phone efforts likely to be set
    in motion by an individual whose cell phone has been stolen.
    78
    standing to challenge).29 The fact that (we presume) police officers actually found
    appellant‘s location by using the cell-site simulator on appellant‘s cell phone
    should not change the Fourth Amendment calculus.
    B. The (assumed) fact that the police actually used the cell-site
    simulator as to appellant’s cell phone while it was on the public roads
    does not provide a basis for finding a Fourth Amendment violation.
    My colleagues focus, however, on the apparent fact that the police entered
    the identifying number for appellant‘s cell phone into the cell-site simulator and
    thus used it to locate appellant‘s phone rather than the co-located stolen phone.
    They emphasize that ―when it comes to the Fourth Amendment, means . . . matter.‖
    Ante, at 18 (quoting 
    Maynard, 615 F.3d at 566
    ). But, as the D.C. Circuit explained
    in Maynard, what matters with respect to the means employed is whether ―one‘s
    reasonable expectation of control over one‘s personal information would . . . be
    defeated‖ through that means of information 
    gathering. 615 F.3d at 566
    . For the
    reasons already discussed, on the facts of this case, appellant had no reasonable
    expectation of control over the information about his location while he was on the
    29
    See Lucas v. United States, 
    411 A.2d 360
    , 363 (D.C. 1980) (―[I]t is not so
    clear that persons can always assume that the right to privacy extends to articles of
    contraband in their possession.‖); United States v. White, 504 F. App‘x 168, 172
    (3d Cir. 2012) (citing authority from several federal circuits that one who
    knowingly possesses a stolen item has no legitimate expectation of privacy with
    respect to it and no standing to challenge a search of it).
    79
    public roads with the powered-on, stolen cell phone in his possession.
    Moreover, while the ―means . . . matter‖ principle applies a fortiori when it
    comes to law enforcement efforts to learn about what is contained or is transpiring
    in a home,30 the principle applies with much less consistency when what is
    challenged as a ―search‖ took place on public roads. See 
    Knotts, 460 U.S. at 282
    (explaining that the defendants had no legitimate expectation of privacy that was
    violated by use of a beeper, pre-installed inside a container of chemicals that the
    defendant purchased and put in his car, which sent signals to a police receiver and
    enabled police to track the movements of the car, because police could have
    tracked the car‘s movements by driving behind it); United States v. Patrick, 
    842 F.3d 540
    , 545 (7th Cir. 2016) (concluding that because the defendant, located with
    use of a cell-site simulator, was at the time ―in a public place, where he had no
    legitimate expectation of privacy, [he could]not complain about how the police
    30
    See, e.g., 
    Kyllo, 533 U.S. at 35
    n.2 (analyzing whether use of a thermal-
    imaging device, capable of detecting the amount of heat emanating from a home,
    constituted an unlawful search when, without a warrant, it was aimed at the home
    of an individual suspected of growing marijuana in his home using high-intensity
    lamps; reasoning that the ―comparison of the thermal imaging to various
    circumstances in which outside observers might be able to perceive, without
    technology, the heat of the home — for example, by observing snowmelt on the
    roof — is quite irrelevant. The fact that equivalent information could sometimes
    be obtained by other means does not make lawful the use of means that violate the
    Fourth Amendment‖ (internal citation omitted)).
    80
    learned his location.‖); see also 
    Gbemisola, 225 F.3d at 759
    .
    My colleagues ultimately acknowledge that ―certain forms of tracking [in
    public spaces] . . . do not invade a reasonable expectation of privacy.‖ Ante at 18.
    What they seem to regard as dispositive is that by using the cell-site simulator, the
    police ―actively induce[d] the phone to divulge its identifying information.‖ Ante
    at 17. Judge Farrell sees as the critical fact that with the cell-site simulator, the
    police TSU officers ―commandeer[ed]‖ appellant‘s cell phone, turning it into a
    ―self-investigative‖ tool. I have several responses.
    First, for a couple of reasons, I believe the foregoing characterizations
    somewhat overstate the facts.      As one court has noted, ―cell phones identify
    themselves by an automatic process called ‗registration,‘ which occurs
    continuously while the cell phone is turned on regardless of whether a call is being
    placed.‖ 
    Tracey, 152 So. 3d at 507
    n.1.31 That observation accords with the
    31
    See also Copes, 2017 Md. LEXIS 478, at *6 (―A cell site
    simulator . . . takes advantage of the fact that a cell phone — when turned on —
    constantly seeks out nearby cell towers, even if the user is not making a call
    . . . When the cell site simulator is close enough, the target phone will connect to it
    as though it were a cell tower.‖); In re Application for Tel. Info. Needed for a
    Criminal Investigation, 
    119 F. Supp. 3d 1011
    , 1014 (N.D. Cal. 2015) (―[C]ell
    phones, when turned on and not in airplane mode, are always scanning their
    network‘s cellular environment. In so doing, cell phones periodically identify
    themselves to the closest cell tower — i.e., the one with the strongest radio signal
    (continued…)
    81
    testimony by defense telecommunications technology expert Ben Levitan in this
    case. See Levitan Aff. 5 (―When a phone attaches itself to a cell tower, it identifies
    itself by phone number and various codes.‖).           In other words, identifying
    themselves constantly is what powered-on cell phones do, regardless of whether a
    cell-site simulator is in the area. Second, while the majority opinion accurately
    quotes TSU Sergeant Perkins‘s testimony that the cell-site simulator ―grabs [the
    target cell phone] and holds on to it for a minute,‖ the opinion does not recount
    Sergeant Perkins‘s additional explanation. Sergeant Perkins explained that ―by
    grabs it,‖ he meant that the cell site simulator ―just knows it‘s there,‖ much as one
    knows when he has arrived at a station he is looking for by scanning the radio dial.
    Mr. Levitan put it differently, explaining that cell phones ―generally connect
    themselves to the strongest cell tower signal that they detect,‖ and, in that vein,
    when a cell phone detects the cell-site simulator as having the strongest signal, it
    will ―break its connection with the cell phone network and reattach itself to the
    newly found . . . simulator.‖ The Department of Justice document entitled ―Dep‘t
    of Justice Policy Guidance: Use of Cell-Site Simulator Technology (Sept. 3,
    (…continued)
    — as they move throughout their network‘s coverage area. This process[ is]
    known as ‗registration‘ or ‗pinging[.]‘ . . . Pinging is automatic and occurs
    whenever the phone is on, without the user‘s input or control.‖ (record citations
    omitted)).
    82
    2015),     http://www.justice.gov/opa/file/767321/download        (the   ―DOJ     Policy
    Guidance‖), states similarly that ―cellular devices in the proximity of the [cell-site
    simulator] identify the simulator as the most attractive cell tower in the area and
    thus transmit signals to the simulator that identify the device in the same way that
    they would with a networked tower.‖ 
    Id. at 2.
    Thus — if it matters — it appears
    that it is cell phones that initiate contact with a cell-site simulator and not the other
    way around.32
    In any event, my colleagues raise points that must be addressed when they
    emphasize that by using the cell-site simulator, the TSU officers took ―functional
    control‖ of and ―coopted [appellant‘s] phone, forcing it to do something [he] surely
    never intended it to do: reveal its identifying and location information to an entity
    32
    But see 
    Andrews, 134 A.3d at 340
    (citing testimony in that case that a
    cell-site simulator known as the Hailstorm ―is an active device that can send an
    electronic signal . . . and ‗draw[] the phone to [the] equipment‖‘ (alteration in
    original)).
    My colleagues also say that the cell-site simulator ―exploits a security
    vulnerability‖ of cell phones. Ante at 17. I would not call what happened here as
    exploitation of a cell phone security flaw, but as law enforcement‘s taking
    advantage of a security-enhancement feature that aids in the recovery of stolen or
    lost phones. It may place a person who is traveling on the roads with a powered-
    on, stolen cell phone (that circumstances show he knew to be stolen) in the position
    either of accepting the risk that at any moment the stolen cell phone or his own cell
    phone could be converted into a tracking device or, alternatively, turning the
    phones off, but I do not see why that is an improper choice to foist on the person.
    83
    other than a telecommunications provider.‖ Ante, at 24 n.27. Judge Farrell finds it
    ―unpersuasive‖ ―to argue that appellant had no reasonable expectation of privacy in
    the police‘ use of his phone‖ for this purpose. Ante, at 47. One major problem for
    my colleagues‘ analysis, however, is that, as shocking or outrageous as the
    foregoing characterizations might sound, the officer‘s use of the cell-site simulator
    did not constitute a ―search‖ and thus was not a Fourth Amendment violation
    unless appellant had a reasonable and legitimate expectation of privacy with
    respect to the object of the challenged search: his location information. For the
    reasons already discussed, he did not while he was on the public roads with a
    trackable, stolen cell phone.
    It is helpful to recall the facts of California v. Greenwood, 
    486 U.S. 35
    (1988). In Greenwood, a police detective asked the regular trash collector in
    Greenwood‘s neighborhood to pick up the plastic garbage bags that Greenwood
    had left on the curb in front of his house and to turn the bags over to the detective
    without mixing their contents with garbage from other houses. 
    Id. at 37.
    The trash
    collector responded by cleaning his truck bin of other garbage, collecting the
    garbage bags from the street in front of Greenwood‘s house, and turning the bags
    over to the detective. 
    Id. The detective
    searched through the trash and found items
    indicative of narcotics use. 
    Id. at 37–38.
    The Greenwood respondents asserted
    84
    ―that they had, and exhibited, an expectation of privacy with respect to the trash
    that was searched by the police,‖ emphasizing that the trash had been placed on the
    street for collection at a fixed time and was contained in opaque bags, which the
    garbage collector was expected to pick up, mingle with the garbage of others, and
    deposit at the garbage dump. 
    Id. at 39.
    The respondents also highlighted that
    ―there was little likelihood that [the trash] would be inspected by anyone.‖ 
    Id. The Supreme
    Court acknowledged that ―[i]t may well be that respondents did not
    expect that the contents of their garbage bags would become known to the police
    or other members of the public,‖ 
    id. at 39,
    but reasoned nevertheless that the police
    conduct did not constitute a Fourth Amendment violation (because respondents
    ―could have had no reasonable expectation of privacy in the inculpatory items that
    they discarded‖). 
    Id. at 41.
    In my view, the intrusive police conduct in Greenwood, by which police
    officers converted the entire contents of respondent‘s trash into a database of
    information about his activities, was every bit as objectionable as the temporary
    ―coopt[ing]‖ of appellant‘s cell phone. I suspect most of us would be outraged at
    the effrontery of law enforcement officials in systematically inspecting our trash.
    But that would not be enough to establish that police officers‘ systematic
    85
    rummaging through our trash is a ―search‖ for Fourth Amendment purposes.33
    And any sense of outrage here is likewise not enough to establish that use of the
    cell-site simulator in the particular circumstances of this case violated appellant‘s
    Fourth Amendment rights.34
    But even if we assume that the TSU officers‘ taking ―functional control‖ of
    and ―coopt[ing] [appellant‘s] phone‖ was a search and/or seizure for Fourth
    Amendment purposes, there is yet another consideration that, in my view, should
    preclude the court from concluding that the search/seizure was unlawful.35 The
    33
    Cf. Historical Cell Site 
    Data, 724 F.3d at 615
    (―We understand that cell
    phone users may reasonably want their location information to remain private, just
    as they may want their trash, placed curbside in opaque bags, . . . to remain so. But
    the recourse for these desires is in the market or the political process . . . . The
    Fourth Amendment, safeguarded by the courts, protects only reasonable
    expectations of privacy.‖ (internal citation omitted)).
    34
    Another lesson from Greenwood is the principle on which Gbemisola,
    was decided: that if the individual does not have a reasonable expectation of
    privacy in the object of an activity that we would describe in ordinary parlance as a
    search, there is no search for Fourth Amendment purposes even if the manner in
    which law enforcement conducted their garbage inspection was not available to
    most members of the public. The Supreme Court observed in Greenwood that the
    respondents‘ trash was readily accessible to ―animals, children, scavengers,
    snoops, and other members of the 
    public.‖ 486 U.S. at 40
    . But it is likely that few
    people other than the police would have been granted the accommodation of
    having the trash collector segregate all of the respondents‘ garbage from other
    garbage.
    35
    ―A ‗seizure‘ of property occurs when ‗there is some meaningful
    interference with an individual‘s possessory interests in that property.‘‖ Karo, 468
    (continued…)
    86
    police TSU officers could reasonably infer that the stolen cell phone and
    appellant‘s phone were traveling together in a car or other vehicle because the real-
    time location information showed them as having gone from Capitol Heights,
    Maryland, to Kenilworth Avenue, before moving to the 4000 block of Minnesota
    Avenue, N.E.     The automobile exception to the Fourth Amendment warrant
    requirement ―permits the warrantless search of a car [or other vehicle] that is
    ‗readily mobile‘ so long as ‗probable cause exists to believe it contains
    contraband.‘‖   United States v. Eshetu, 
    863 F.3d 946
    , 951 (D.C. Cir. 2017)
    (quoting Pennsylvania v. Labron, 
    518 U.S. 938
    , 940 (1996) (per curiam)); United
    States v. Shackleford, 
    830 F.3d 751
    , 753 n.2 (8th Cir. 2016) (―The automobile
    exception requires probable cause to believe contraband or evidence of any crime
    will be found in the vehicle[.]‖).36 And, ―[i]f probable cause justifies the search of
    (…continued)
    U.S. at 712 (quoting United States v. Jacobsen, 
    466 U.S. 109
    , 113 (1984)). There
    was at least arguably a seizure here, because, according to the testimony, use of the
    cell-site simulator may have caused calls appellant tried to make from his phone to
    drop. (I note that to the extent that the presence of the cell-site simulator in the
    area caused dropped calls or other disruption of the cell phones of other people in
    the area, appellant has no standing to complain.)
    36
    See also California v. Carney, 
    471 U.S. 386
    , 393 n.2 (1985) (―With few
    exceptions, the courts have not hesitated to apply the vehicle exception to vehicles
    other than automobiles.‖); 
    id. at 392-93
    (explaining that if a vehicle ―is readily
    capable of such use [on the highways] and is found stationary in a place not
    regularly used for residential purposes,‖ the ―justifications for the vehicle
    (continued…)
    87
    a lawfully stopped vehicle, it justifies the search of every part of the vehicle and its
    contents that may conceal the object of the search.‖ United States v. Ross, 
    456 U.S. 798
    , 825 (1982); 
    Eshetu, 863 F.3d at 952
    .
    ―Probable cause exists when based on the known facts and circumstances, a
    reasonably prudent person would believe that contraband or evidence of a crime
    will be found in the place to be searched.‖ United States v. Charles, 
    801 F.3d 855
    ,
    860 (7th Cir. 2015) (internal quotation marks omitted). Here, even before using
    the cell-site simulator, the police TSU officers had near real-time cell-site location
    information that gave them probable cause to believe that a vehicle was on the
    public roads with both the stolen cell phone and the cell phone used by the sexual
    assault/robbery perpetrator, and thus probable cause to believe that—whatever the
    subject vehicle‘s precise location on the roads37—it contained contraband and
    (…continued)
    exception come into play,‖ because ―the vehicle is obviously readily mobile by the
    turn of an ignition key, if not actually moving‖); 
    id. at 392
    (―[I]ndividuals always
    have been on notice that movable vessels may be stopped and searched on facts
    giving rise to probable cause that the vehicle contains contraband, without the
    protection afforded by a magistrate‘s prior evaluation of those facts.‖ (internal
    quotation marks and alterations omitted)). And, there is exigency about searching
    a vehicle where there is probable cause to believe it contains contraband: ―[T]he
    overriding societal interests in effective law enforcement justify an immediate
    search before the vehicle and its occupants become unavailable.‖ 
    Id. at 393.
          37
    Cf. State v. Tate, 
    849 N.W.2d 798
    , 810 (Wis. 2014) (reasoning that even
    if a warrant had been required to authorize use of a cell-site simulator, the exact
    (continued…)
    88
    evidence of a crime. This means that — under the automobile exception — the
    vehicle was searchable without a warrant, and that any cell phones in it that might
    have been contraband or evidence of the crime could be seized.38 We should
    therefore hold that when the cell-site simulator simultaneously detected/caught the
    signal from appellant‘s cell phone (which was located in a car parked on the street)
    and ―seized‖ the phone by ―hold[ing] on to it for a minute,‖ there was no Fourth
    Amendment violation. Any locational information obtained from the cell phone
    was not content that could be searched only pursuant to a warrant.39
    (…continued)
    place to be searched, such as a street address, was not required).
    38
    Our request for supplemental briefing signaled, without explicitly
    suggesting, that the automobile exception might be implicated on the facts of this
    case (and amici briefly addressed its applicability in their initial brief).
    39
    See 
    Graham, 824 F.3d at 434
    (rejecting the argument that cell-site
    location information should be treated as ―content‖ for Fourth Amendment
    purposes).
    Again, this case does not involve a warrantless search of any digital content
    (such as text messages, emails, contact lists, call logs, voicemail messages,
    photographs, videos, files, internet browsing history, apps that are revelatory of a
    person‘s interests, historic location information, etc.) stored on appellant‘s cell
    phone, the conduct for which, the Supreme Court determined in Riley v.
    California, 
    134 S. Ct. 2473
    , 2485 (2014), a warrant was needed. See 
    id. at 2480-
    81 (involving a search of the cell phone that was found in Riley‘s pocket after he
    was stopped for driving with expired tags and subsequently arrested for possession
    of concealed and loaded firearms); see also DOJ Policy Guidance at 2 (―[T]he
    [cell-site] simulator does not remotely capture emails, texts, contact list, images or
    any other data from the phone.‖). The seizure, ―interfer[ence] with the
    functioning‖ of, or ―coopt[ing]‖ of appellant‘s phone involved here, including the
    (continued…)
    89
    ***
    I end by repeating and underscoring that my dissent rests on the particular
    facts of this case:    Police had near real-time information, from cell phone
    providers, that the cell phone the robbery/sexual assault assailant had used to lure
    his victims was traveling on the public streets together with a trackable, powered-
    on cell phone stolen from one of the assailant‘s victims (who gave the police
    permission to obtain her phone records); they could infer that the phones were
    traveling together in a car or other vehicle; and law enforcement officers‘ use of a
    cell-site simulator in the vicinity led them to a ―handful of cars‖ parked at the
    Minnesota Avenue Metro station and to a car in which appellant sat with the stolen
    cell phone in his possession.      To hold that the officers‘ use of the cell-site
    simulator in this case was lawful would come nowhere close to holding, as my
    colleagues conclude, that police may use cell-site simulators ―at will‖ to locate any
    individual who is carrying a cell phone, without regard to whether the individual is
    known to be in a vehicle moving through the public streets and without regard to
    (…continued)
    effect of having his calls dropped, is akin to the interruptions or intrusions that the
    Riley Court found permissible when police officers execute a search incident to
    arrest that turns up a cell phone: they are ―free to examine the physical aspects of
    [the] phone,‖ may ―turn the phone off or remove its battery,‖ or may ―leave a
    phone powered on and place it in an enclosure that isolates the phone from radio
    
    waves.‖ 134 S. Ct. at 2485
    , 2487.
    90
    whether the individual is known to have with him in the vehicle both a trackable
    cell phone stolen during a set of robberies and the cell phone from which an
    assailant placed calls to lure his sexual assault/robbery victims. Quite the contrary,
    the holding I believe is the right one would, because of its nuanced analysis, sound
    a cautionary note about using a cell-site simulator in other circumstances without a
    warrant.40
    What we should not do in resolving this appeal is to jump on the bandwagon
    of decrying what is claimed to be a Fourth Amendment violation from use of cell-
    site-simulator technology without recognizing how the particular, material facts of
    this case distinguish it from the cell-site simulator cases courts have decided before
    this one. The Supreme Court has recognized the need for ―consideration of case-
    40
    In addition, even if I assume arguendo that there was a Fourth
    Amendment violation, I am doubtful that suppression in this case would ―pay its
    way,‖ United States v. Leon, 
    468 U.S. 897
    , 907 n.6 (1984), under the ―cost-benefit
    analysis in exclusion cases,‖ Davis v. United States, 
    564 U.S. 229
    , 238 (2011),
    particularly in light of the Department of Justice‘s announced general policy that
    the government now must seek warrants for cell-site simulator use. DOJ Policy
    Guidance at 3-4. ―[T]he [exclusionary] rule‘s operation [is limited] to situations in
    which th[e] purpose [of deterrence] is thought most efficaciously served‖;
    accordingly, ―[w]here suppression fails to yield appreciable deterrence, exclusion
    is clearly unwarranted.‖ 
    Davis, 564 U.S. at 237
    (internal alterations and quotation
    marks omitted).
    91
    specific exceptions to the warrant requirement‖;41 we are remiss if we do not
    carefully consider the distinguishing facts of this case; and the public deserves no
    less from us, even as we do what we must to protect precious Fourth Amendment
    rights.
    For all the foregoing reasons, I respectfully dissent from the judgment
    reversing appellant‘s convictions of two counts of first-degree sexual abuse while
    armed, two counts of kidnapping while armed, four counts of robbery while armed,
    and one count of threats.
    41
    
    Riley, 134 S. Ct. at 2486
    .