Everett v. State , 186 A.3d 1224 ( 2018 )


Menu:
  •            IN THE SUPREME COURT OF THE STATE OF DELAWARE
    TERRANCE E. EVERETT,                   §
    §      No. 257, 2017
    Defendant Below,                 §
    Appellant,                       §
    §      Court Below:
    v.                        §      Superior Court of the
    §      State of Delaware
    STATE OF DELAWARE,                     §
    §
    §      Cr. I.D. No. 1511002499 (N)
    Plaintiff Below,                 §
    Appellee.                        §
    Submitted: March 21, 2018
    Decided: May 29, 2018
    Before VALIHURA, VAUGHN, and TRAYNOR, Justices.
    Upon appeal from the Superior Court. AFFIRMED.
    Nicole M. Walker, Esquire, Office of the Public Defender, Wilmington, Delaware, for
    Appellant.
    Martin B. O’Connor, Esquire, Department of Justice, Wilmington, Delaware, for
    Appellee.
    VALIHURA, Justice:
    When a person voluntarily accepts a “friend” request on Facebook from an
    undercover police officer, and then exposes incriminating evidence, does the Fourth
    Amendment protect against this mistaken trust? We conclude that it does not.
    Here, the defendant-appellant, Terrance Everett (“Everett”), accepted the friend
    request from a detective who was using a fictitious profile. The detective then used
    information gained from such monitoring to obtain a search warrant for Everett’s house,
    where officers discovered evidence that prosecutors subsequently used to convict him.
    In the proceedings below, Everett moved for a so-called reverse-Franks hearing,
    named for the United States Supreme Court opinion in Franks v. Delaware.1 He asked the
    trial court to determine whether the detective knowingly and intentionally, or with reckless
    disregard for the truth, omitted information from the affidavit—namely, information
    concerning the detective’s covert Facebook monitoring—that was material to the
    magistrate’s finding of probable cause. Everett argued that, if he made this showing by a
    preponderance of the evidence at such a hearing, then the evidence obtained via this
    warrant should be suppressed. The Superior Court denied Everett’s motion from the bench
    on February 16, 2017. Everett appeals that decision and now seeks reversal of his
    conviction.
    For the reasons set forth below, we AFFIRM the Superior Court’s denial of
    Everett’s motion.
    1
    
    438 U.S. 154
     (1978).
    1
    A.     Factual Background
    At some point during 2012 or 2013, Detective Bradley Landis of the New Castle
    County Police Department began monitoring Everett’s Facebook page using a fake profile,
    including a fake name and pictures. Detective Landis regularly monitored Everett’s page
    between one to three times per week for at least two years. During this monitoring,
    Detective Landis used the fake profile to send Everett a “friend request.” Everett accepted
    the “friend request.” Based on the record before us, it is unclear what information from
    Everett’s Facebook page was available to Detective Landis before “friending” Everett and
    what information was available only after the two became “friends.”2
    On November 4, 2015, Detective Landis saw a photo on Everett’s Facebook page
    that was posted at 5:00 AM that morning. The photo (“Photo”) showed a nightstand with
    several items on top of it: a handgun, a Mercedes car key, a large amount of cash, a pay
    stub, two cell phones, and a framed photograph of Everett wearing a black T-shirt and a
    red necklace. Although Everett was not in the Photo, the caption read: “Just getting in for
    the night, how I sleep every night.”3
    2
    When considering Everett’s motion, the trial judge questioned both parties about Everett’s
    Facebook privacy settings. Everett’s counsel stated that he did not know whether the photos in
    evidence were “Friend-only protected” or whether they were viewable on Everett’s public profile.
    Trial Transcript (Feb. 15, 2017), at A095. The State noted that it appeared that, “at some point,
    maybe in 2016,” Everett changed his Facebook profile to a “private page, which does restrict some
    access.” 
    Id.
     But, the State also argued that, “at some point, there is evidence to suggest that it
    was, in fact, a public page that anyone could go on and look at.” 
    Id.
    3
    Search Warrant Application and Affidavit (Nov. 4, 2015), at A018 [hereinafter Warrant
    Affidavit].
    2
    On that same day, November 4, 2015, Detective Landis applied for a warrant to
    search Everett’s house. In the application, Detective Landis swore that he:
     observed Everett’s Facebook page and the Photo “while browsing Facebook”;
     knew the Facebook page was Everett’s because Everett posted daily self-filmed
    videos and photographs at various locations, and he was familiar with Everett
    from previous contacts and criminal investigations;
     personally saw Everett operate a tan Mercedes on multiple occasions;
     was aware that Everett was a person prohibited from possessing deadly weapons,
    including firearms, due to numerous violent felony convictions;
     was aware that Everett was currently on federal probation for conspiracy to
    possess with intent to distribute more than 500 grams of cocaine and cocaine
    base, and that Everett would be on federal probation until January 2020;
     was aware that Everett was currently being supervised by the Delaware
    Probation and Parole Sex Crimes unit;
     contacted Everett’s probation officer to verify Everett’s address and then drove
    past Everett’s residence and observed a tan Mercedes parked out front;
     observed distinguishing features on the handgun upon closer examination of the
    Photo and, after additional investigation on the Smith & Wesson website,
    determined that the firearm in the Photo was in fact a Smith & Wesson.
    The search warrant, which was both authorized and executed on November 5, 2015,
    allowed police to conduct a daytime search of Everett’s residence to collect DNA samples
    and/or a deadly weapon. During the search of Everett’s home, police recovered a loaded
    nine-millimeter Smith & Wesson handgun; the handgun’s original box with a serial number
    matching the Smith & Wesson handgun; clothing, including the black T-shirt and the red
    necklace that Everett was wearing in the Photo and other Facebook photos; and Everett’s
    pay stubs.
    3
    Police arrested Everett on November 17, 2015. A Grand Jury indicted him on
    December 21, 2015, for one count of Possession of a Firearm By a Person Prohibited in
    violation of 11 Del. C. § 1448, and one count of Possession of Ammunition By a Person
    Prohibited in violation of 11 Del. C. § 1448. According to the indictment, Everett was a
    “person prohibited” because he had previously been convicted of two felony counts of
    Reckless Endangering (first degree) and one felony count of Possession with Intent to
    Deliver a Controlled Substance.4 A jury trial began on February 14, 2017, and the parties
    stipulated that Everett was a person prohibited.
    On the first day of trial, Detective Landis disclosed that he began monitoring
    Everett’s Facebook page “approximately two years” before he saw the Photo. Further,
    Detective Landis testified that he monitored Everett’s page by using a fake Facebook
    profile under a fake name and using photos that he found on the Internet, rather than his
    own personal photos. The day after learning the details of Detective Landis’s monitoring
    of his Facebook page, Everett moved for a mistrial or, in the alternative, a reverse-Franks
    hearing.5 The Superior Court denied the motion in a bench ruling on February 16, 2017.6
    4
    Indictment at A014. The warrant affidavit also states that a search of the Delaware Criminal
    Justice Information System revealed that “Terrance has been convicted twice of Reckless
    Endangering First (05/06/02, 11/23/10), three counts of Unlawful Sexual Contact (08/08/96), and
    Possession with intent to deliver a narcotic schedule II controlled substance (10/19/05), all of
    which are violent felonies.” Warrant Affidavit, supra note 3, at A019.
    5
    Trial Transcript (Feb. 15, 2017), at A092. There is no written motion in the record. Rather, at
    the start of the second day of the trial, Everett’s counsel stated to the court: “I am assuming Your
    Honor got my e-mail this morning?” Id. Everett’s counsel then said that he provided the State
    with a copy of the e-mail. Id.
    6
    Trial Transcript (Feb. 16, 2017), at A108.
    4
    In denying the motion, the trial judge found “that the omitted facts were not material for
    [the] purposes of issuance of a search warrant.”7
    On February 16, 2017, the jury found Everett guilty of only one of the charges,
    Possession of a Firearm By a Person Prohibited, and the Superior Court ordered a
    presentence investigation. On February 22, 2017, Everett filed a Motion for a New Trial
    arguing that the two verdicts were legally inconsistent because he was found guilty on the
    possession charge but not the ammunition charge. The Superior Court denied the motion
    on May 18, 2017. The State filed a motion to declare Everett a habitual offender, and the
    Superior Court granted the motion on June 2, 2017. The court sentenced Everett to fifteen
    years of Level V imprisonment, followed by six months of Level II probation.
    B.     Scope and Standard of Review
    This Court “review[s] a trial court’s evidentiary rulings for abuse of discretion.”8
    “Where the facts are not in dispute and only a constitutional claim of probable cause is at
    issue, this Court’s review of the Superior Court’s ruling is de novo.”9
    7
    Id.
    8
    Adams v. State, 
    124 A.3d 38
    , 45 (Del. 2015) (citing Jones v. State, 
    940 A.2d 1
    , 9 (Del. 2007)).
    Generally, a request for a Franks or reverse-Franks hearing accompanies a motion to suppress,
    and this Court reviews the denial of such motions for abuse of discretion. See Restrepo-Duque v.
    State, 
    130 A.3d 340
    , 
    2015 WL 9268145
    , at *3 (Del. Dec. 17, 2015) (TABLE) (“This Court reviews
    a trial court’s evidentiary rulings, including a denial of a motion to suppress, for abuse of
    discretion.” (citing Adams, 124 A.3d at 45)).
    9
    State v. Holden, 
    60 A.3d 1110
    , 1113 (Del. 2013) (citing Smith v. State, 
    887 A.2d 470
    , 473 (Del.
    2005)).
    5
    C.     Analysis
    Everett’s claim is somewhat convoluted, but his central argument is that Detective
    Landis’s monitoring of his Facebook page constituted an unlawful, warrantless “search”
    and, thus, any information seized pursuant to it must be suppressed as the fruit of the
    poisonous tree in violation of the Fourth Amendment of the United States Constitution and
    Article I, Section 6 of the Delaware Constitution. However, instead of launching a direct
    challenge under the search-and-seizure provisions of the United States and Delaware
    Constitutions, Everett asserts a so-called reverse-Franks claim10 and, as such, argues that
    the Superior Court erred in denying him a hearing to determine whether Detective Landis
    knowingly and intentionally, or with reckless disregard for the truth, omitted information
    from his warrant affidavit that would have vitiated the magistrate’s finding of probable
    cause—i.e., that the affidavit omitted material information. That is, Everett argues that,
    had the authorizing magistrate known about the “arbitrary ruse” that Detective Landis
    employed via Facebook, the magistrate would have denied the warrant application because
    the affidavit’s facts about Everett’s Facebook page were based on an unconstitutional
    search, and thus any evidence seized under such a warrant should be suppressed.
    10
    This is known as a “reverse-Franks” claim because it is the converse of the situation in Franks
    v. Delaware, 
    438 U.S. 154
     (1978), where the United States Supreme Court held that, “where the
    defendant makes a substantial preliminary showing that a false statement knowingly and
    intentionally, or with reckless disregard for the truth, was included by the affiant in the warrant
    affidavit, and if the allegedly false statement is necessary to the finding of probable cause, the
    Fourth Amendment requires that a hearing be held at the defendant’s request.” 
    Id. at 155-56
    ; see
    Sisson v. State, 
    903 A.2d 288
    , 300 (Del. 2006) (“If the police omit facts that are material to a
    finding of probable cause with reckless disregard for the truth, then the rationale of Franks v.
    Delaware applies.” (quoting Smith v. State, 
    887 A.2d 470
    , 472 (Del. 2005))).
    6
    Despite Everett’s awkward framing, we consider his argument for what it is: a claim
    that Detective Landis’s Facebook monitoring violated his constitutional rights and that,
    without that tainted information, the search warrant affidavit did not establish probable
    cause.
    We evaluate that argument under a two-step framework. First, we consider whether
    the Facebook monitoring violated the Fourth Amendment or Article I, Section 6 of the
    Delaware Constitution. If it did, then we “must ‘excise the tainted evidence [from the
    warrant affidavit] and determine whether the remaining, untainted evidence would provide
    a neutral magistrate with probable cause to issue [the] warrant.’”11 In this case, we need
    not go beyond the first step: Detective Landis’s monitoring of Everett on Facebook did not
    run afoul of the Fourth Amendment or Article I, Section 6 of the Delaware Constitution.
    Everett focuses his arguments on attempting to refute the trial court’s conclusion
    that it was “unable to find any basis in law in support of the proposition that the dissembling
    conduct of law enforcement would have altered the magistrate’s issuance of the search
    warrant.”12 Everett argues that “the trial court reached its erroneous conclusion without
    considering either Everett’s legitimate expectation of privacy in his Facebook posts or the
    extent of Landis’ intrusion upon that legitimate expectation,”13 which is essentially arguing
    that the trial court ignored a Fourth Amendment or Article I, Section 6 violation. Everett
    11
    Jones v. State, 
    28 A.3d 1046
    , 1058 (Del. 2011) (quoting United States v. Herrold, 
    962 F.2d 1131
    , 1138 (3d Cir. 1992)).
    12
    Trial Transcript (Feb. 16, 2017), at A107.
    13
    Appellant’s Opening Br. at 11.
    7
    also argues that Detective Landis presented no evidence that the privacy settings of his
    Facebook page were “set to anything other than ‘private.’” And, given that Detective
    Landis had “friended” Everett, Everett argues that it is reasonable to assume that his
    settings were “private” and, as such, the Photo itself was only viewable to his friends and,
    thus, he had a “legitimate expectation of privacy.”14 Finally, he asserts that, even assuming
    arguendo that his acceptance of Detective Landis’s “friend” request amounted to consent,
    Detective Landis’s use of deception rendered that consent involuntary because the
    detective lacked the reasonable suspicion to monitor him.
    We reject Everett’s contentions because Everett did not have a reasonable
    expectation that the Facebook posts that he voluntarily shared with Detective Landis’s fake
    profile and other “friends” would not be disclosed. We observe that Detective Landis did
    not request or access the Photo directly from Facebook, the third-party service provider—
    a scenario that we need not address here. Rather, Everett made the Photo accessible to his
    “friends” and, by doing so, he assumed the risk that one of them might be a government
    officer or share his information with law enforcement.
    The United States and Delaware Constitutions protect the rights of persons to be
    secure from “unreasonable searches and seizures.”15 A search does not occur “unless ‘the
    individual manifested a subjective expectation of privacy in the object of the challenged
    14
    Id. at 12-13.
    15
    U.S. Const. amend IV; Del. Const. art. I, § 6.
    8
    search,’ and ‘society [is] willing to recognize that expectation as reasonable.’”16 This test
    derives from Justice Harlan’s concurrence in Katz v. United States,17 a case in which the
    majority found that the government violated the defendant’s Fourth Amendment rights by
    installing an electronic listening device on a public telephone booth and recording the
    defendant’s calls—actions that produced evidence leading to the defendant’s conviction.
    Though the majority stressed that “the Fourth Amendment protects people, not places,”18
    Justice Harlan nonetheless observed that determining “what protection [the Fourth
    Amendment] affords to those people” whom it protects “requires reference to a ‘place’”—
    i.e., evaluation of whether, by intruding on the place in question, the government could be
    said to have conducted a “search” that is “presumptively unreasonable in the absence of a
    search warrant.”19 Justice Harlan observed that “there is a twofold requirement” for an
    intrusion on a particular place to qualify as a search—“first that a person have exhibited an
    actual (subjective) expectation of privacy and, second, that the expectation be one that
    society is prepared to recognize as ‘reasonable.’”20 And Justice Harlan explained that, as
    16
    Kyllo v. United States, 
    533 U.S. 27
    , 33 (2001) (quoting California v. Ciraolo, 
    476 U.S. 207
    (1986)) (applying the Fourth Amendment). Similarly, standing to challenge government action as
    an unconstitutional search depends on “whether the person . . . has a legitimate expectation of
    privacy in the invaded place.” Hanna v. State, 
    591 A.2d 158
    , 163 (Del. 1991) (quoting Rakas v.
    Illinois, 
    439 U.S. 128
    , 143 (1978)). “A subjectively held expectation of privacy is legitimate if it
    is ‘one that society is prepared to recognize as reasonable.’” 
    Id.
     (quoting Rakas, 439 U.S. at 143-
    44 n.12). This test also applies to challenges to searches under Delaware law. See id. at 164.
    17
    
    389 U.S. 347
     (1967).
    18
    
    Id. at 351
    .
    19
    
    Id. at 361
     (Harlan, J., concurring).
    20
    
    Id.
     (“Thus a man’s home is, for most purposes, a place where he expects privacy, but objects,
    activities, or statements that he exposes to the ‘plain view’ of outsiders are not ‘protected’ because
    no intention to keep them to himself has been exhibited. On the other hand, conversations in the
    9
    applied to the placement of the listening device on the public telephone booth, the “critical
    fact” was that:
    ‘[o]ne who occupies it, (a telephone booth) shuts the door behind him, and
    pays the toll that permits him to place a call is surely entitled to assume’ that
    his conversation is not being intercepted. The point is not that the booth is
    ‘accessible to the public’ at other times, but that it is a temporarily private
    place whose momentary occupants’ expectations of freedom from intrusion
    are recognized as reasonable. 21
    Both Justice Harlan and the majority observed that, in contrast, “[w]hat a person knowingly
    exposes to the public, even in his own home or office, is not a subject of Fourth Amendment
    protection.” 22
    Although Delaware courts have not confronted whether law enforcement officers
    violate the United States Constitution or the Delaware Constitution by monitoring
    information that people make accessible to them when they are undercover, or to other
    Facebook “friends” who are cooperating with law enforcement, cases from other
    jurisdictions suggest that a Facebook user does not have a reasonable expectation that
    information that he shares online with his “friends” will not be revealed by them.23
    open would not be protected against being overheard, for the expectation of privacy under the
    circumstances would be unreasonable.”).
    21
    
    Id.
     (quoting majority opinion at 352, then 351).
    22
    
    Id. at 351
     (majority opinion); 
    id. at 361
     (Harlan, J., concurring).
    23
    See, e.g., Palmieri v. United States, 
    72 F. Supp. 3d 191
    , 210 (D.D.C. 2014) (holding that “when
    a Facebook user allows ‘friends’ to view his information, the Government may access that
    information through an individual who is a ‘friend’ without violating the Fourth Amendment”
    because those friends “‘were free to use the information however they wanted—including sharing
    it with the Government’” (quoting United States v. Meregildo, 
    883 F. Supp. 2d 523
    , 527 (S.D.N.Y.
    2012))); Meregildo, 883 F. Supp. 2d at 526 (“[Defendant’s] legitimate expectation of privacy
    ended when he disseminated posts to his ‘friends’ because those ‘friends’ were free to use the
    information however they wanted—including sharing it with the Government.”).
    10
    A few federal courts have addressed similar scenarios.         In United States v.
    Meregildo,24 the government officers viewed the defendant’s Facebook profile through the
    Facebook account of one of his “friends,” who was a cooperating witness. The officers
    learned that the defendant had posted violent messages and threats online, and that
    information “formed the core of the Government’s evidence of probable cause supporting
    its application for the search warrant.”25 The defendant alleged a Fourth Amendment
    violation given that he “undoubtedly believed that his Facebook profile would not be
    shared with law enforcement.”26 The court acknowledged the defendant’s impression but
    nonetheless found that the defendant “had no justifiable expectation that his ‘friends’
    would keep his profile private” because “those ‘friends’ were free to use the information
    however they wanted—including sharing it with the Government.”27 Thus, the court found
    that the government did not violate the Fourth Amendment in obtaining information
    through the “friend.”28
    In United States v. Gatson,29 the defendant accepted an Instagram friend request
    from an undercover account operated by officers, which allowed the officers to see the
    defendant’s photos and other information. The defendant filed a motion to suppress the
    24
    
    883 F. Supp. 2d 523
     (S.D.N.Y 2012).
    25
    Id. at 526.
    26
    Id.
    27
    Id.
    28
    Id. (“When [the defendant] posted to his Facebook profile and then shared those posts with his
    ‘friends,’ he did so at his peril.”).
    29
    
    2014 WL 7182275
     (D.N.J. Dec. 16, 2014).
    11
    evidence obtained from his Instagram page arguing “that there was no probable cause to
    search and seize items” on his Instagram account.30 The court denied the motion, holding
    that, “[n]o search warrant is required for the consensual sharing of this type of
    information.”31
    Meregildo and Gatson reach the same conclusion, but frame the issue slightly
    differently—and these approaches reflect the two major ways courts have viewed these
    fact patterns. As in Meregildo, some courts view this issue as follows: by making
    information available to “B,” “A” misplaced his trust in B because B could always give
    A’s information to law enforcement. These courts find that, by trusting B, A took a risk
    that B would reveal his information to law enforcement and thus could never have had a
    reasonable expectation of privacy.32 Others (i.e., Gatson) frame the situation as such: by
    30
    Id. at *22.
    31
    Id. (citing United States v. Meregildo, 
    883 F. Supp. 2d 523
     (S.D.N.Y. 2012)).
    32
    See K. Brennan-Marquez, Fourth Amendment Fiduciaries, 
    84 Fordham L. Rev. 611
    , 611 (2015)
    (“Under existing law, if A shares information with B, A runs the risk of ‘misplaced trust’--the risk
    that B will disclose the information to law enforcement”); see also United States v. Miller, 
    425 U.S. 435
    , 443 (1976) (“[T]he Fourth Amendment does not prohibit the obtaining of information
    revealed to a third party and conveyed by him to Government authorities, even if the information
    is revealed on the assumption that it will be used only for a limited purpose and the confidence
    placed in the third party will not be betrayed.”); United States v. White, 
    401 U.S. 745
    , 749 (1971)
    (“[H]owever strongly a defendant may trust an apparent colleague, his expectations in this respect
    are not protected by the Fourth Amendment . . . .”); Rosario v. Clark Cty. Sch. Dist., 
    2013 WL 3679375
    , at *6 (D. Nev. July 3, 2013) (“When a person tweets on Twitter to his or her friends, that
    person takes the risk that the friend will turn the information over to the government.” (citing
    Meregildo, 883 F. Supp. 2d at 526)); United States v. Devers, 
    2012 WL 12540235
    , at *2 (N.D.
    Okla. Dec. 28, 2012) (“[U]nless the defendants can prove that their [F]acebook accounts contained
    security settings which prevented anyone from accessing their accounts, this court finds their
    legitimate expectation of privacy ended when they disseminated posts to their ‘friends’ because
    those ‘friends’ were free to use the information however they wanted–including sharing it with the
    government.”).
    12
    approving B’s access to A’s information, A acted at his peril because B could always be a
    “false friend” or member of law enforcement, and A “consensual[ly] shared” the
    information with B.33 These cases acknowledge that A might have had a subjective
    expectation of privacy, but they seem to suggest that that expectation of privacy was not
    reasonable given the apparent societal view that the law should not remedy “a wrongdoer’s
    [mistaken] belief that a person to whom he voluntarily confides his wrongdoing will not
    reveal it.” 34 Whereas, in Katz, the Supreme Court “held that the Fourth Amendment . . .
    protected Katz because he ‘justifiably relied’ upon the privacy of the telephone booth,”35
    one cannot justifiably rely on others to keep evidence of criminal activity from law
    enforcement.       Though Gatson’s reference to “consensual” sharing might be read as
    implying that A consented to B’s access to the information in question, no case that we
    have found addressing this context expressly says that A gave B “consent.” Discussion of
    “consent” would seem to presuppose that B would have otherwise conducted a “search” of
    33
    Gatson, 
    2014 WL 7182275
    , at *22.
    34
    Hoffa v. United States, 
    385 U.S. 293
    , 302 (1966).
    35
    Kyllo, 
    533 U.S. at 32
     (quoting Katz, 
    389 U.S. at 353
    ); see also Lewis v. United States, 
    385 U.S. 206
    , 210-11 (1966); On Lee v. United States, 
    343 U.S. 747
    , 753-54 (1952); United States v.
    Norman, 448 F. App’x 895, 896-97 (11th Cir. 2011) (“[E]ven if Norman held a subjectively
    reasonable expectation of privacy in the shared files on his computer, this expectation was not
    objectively reasonable.”) (finding that defendant had no reasonable expectation of privacy in child
    pornography contained in a file on his computer accessible to the public via a peer-to-peer file-
    sharing program”); cf. Chaney v. Fayette Cty. Pub. Sch. Dist., 
    977 F. Supp. 2d 1308
    , 1315 (N.D.
    Ga. 2013) (“Even if she had a subjective expectation of privacy in her Facebook photos, Chaney
    cannot show that her expectation is legitimate.”) (finding that a high school student had no
    reasonable expectation of privacy in photos that she posted on Facebook that depicted her wearing
    a bikini).
    13
    a constitutionally protected area by viewing such information because “consent” is a way
    to render that intrusion “reasonable” and therefore constitutional.36
    Though they do not expressly cite it, the “false friend” cases appear to rely on the
    logic of Hoffa v. United States,37 which observed that “no interest legitimately protected
    by the Fourth Amendment is involved” when the defendant invited a cooperating witness
    who was wearing a wire into his hotel suite where the witness then recorded defendant’s
    incriminating statements.38 The United States Supreme Court noted that the cooperating
    witness neither “entered the suite by force or by stealth,” nor was he a “surreptitious
    evesdropper.” Rather, the witness “was in the suite by invitation, and every conversation
    which he heard was either directed at him or knowingly carried on in his presence. The
    petitioner, in a word, was not relying on the security of the hotel room; he was relying upon
    his misplaced confidence that [the witness] would not reveal his wrongdoing.”39
    36
    See, e.g., Orin S. Kerr, The Case for the Third-Party Doctrine, 
    107 Mich. L. Rev. 561
    , 589
    (2009) (“If government conduct does not violate a reasonable expectation of privacy, it is not a
    search, whereas if it violates a reasonable expectation of privacy pursuant to consent, it is a search
    but one that is constitutionally reasonable.”); Sherry F. Colb, What Is A Search Two Conceptual
    Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 
    55 Stan. L. Rev. 119
    , 147
    (2002) (“A consent search is a governmental activity that invades a reasonable expectation of
    privacy, and for which the Fourth Amendment would therefore ordinarily require a warrant. Due
    to the presence of consent, however, the invasion of privacy is ‘reasonable,’ notwithstanding the
    absence of any basis for suspicion or outside authorization. The consent of the person searched
    thus effectively becomes a substitute for probable cause and a warrant.”).
    37
    
    385 U.S. 293
     (1966).
    38
    
    Id. at 302
    ; see also Lewis, 
    385 U.S. at 210-11
    ; On Lee, 
    343 U.S. at 753-54
    .
    39
    Hoffa, 
    385 U.S. at 302
    .
    14
    Though Hoffa preceded Katz, Hoffa was not overruled by Katz.40 Following both
    Hoffa and Katz, the United States Supreme Court extended this “third party” doctrine to
    find that one has no reasonable expectation of privacy in certain other information given
    to third parties, such as records of the telephone numbers one dials (as in Smith v.
    Maryland)41 or bank records (as in United States v. Miller).42 However, the applications
    of the Katz test in these cases have been the focus of much criticism.43 In fact, several
    40
    White, 
    401 U.S. at 749
     (noting that Hoffa “was left undisturbed by Katz”).
    41
    
    442 U.S. 735
    , 742 (1979) (holding that that police did not invade a legitimate expectation of
    privacy when they used a “pen register,” a device that identifies the recipients of a person’s
    telephone calls).
    42
    
    425 U.S. 435
    , 443 (1976) (holding that a depositor had no reasonable expectation of privacy in
    his bank records, and thus no Fourth Amendment search occurred when the government
    subpoenaed them directly from the bank because “[t]he depositor takes the risk, in revealing his
    affairs to another, that the information will be conveyed by that person to the Government.” (citing
    White, 
    401 U.S. at 751-52
    ).
    43
    See, e.g., 1 Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment § 2.7(b)
    (5th ed. 2012) (critiquing Smith by arguing that “[s]uch a crabbed interpretation of the Katz test
    makes a mockery of the Fourth Amendment. Under Smith, the police may without any cause
    whatsoever and for whatever purpose they choose uncover private relationships with impunity
    merely because the telephone company might under some circumstances for certain limited
    purposes make a record of such relationships for the company’s own use.”); id. § 2.7(c) (“The
    result reached in Miller is dead wrong, and the Court’s woefully inadequate reasoning does great
    violence to the theory of Fourth Amendment protection the Court had developed in Katz.”); Susan
    W. Brenner, The Fourth Amendment in an Era of Ubiquitous Technology, 
    75 Miss. L.J. 1
    , 68
    (2005) (“The problem with this holding [in Smith] is that it erroneously assumes Smith had a
    choice. In fact, since [Smith] had no way to shield the numbers he dialed from the telephone
    company, the only choice Smith had to minimize his risk of being observed was to leave home
    and use a pay phone.”); 
    id. at 70
     (“Essentially, Smith presents us with a Hobson’s choice: Embrace
    technology and surrender privacy in the data it compiles and disseminates or reject technology and
    thereby prevent the exposure of one's personal data.”); Robert Ditzion, Electronic Surveillance in
    the Internet Age: The Strange Case of Pen Registers, 
    41 Am. Crim. L. Rev. 1321
    , 1336 (2004)
    (“The only way that Smith’s reasoning based on third-party disclosure could make sense in the
    Internet age would be an undesirable (and likely factually inaccurate) holding that people have no
    expectation of any privacy in their Internet communications.”); Patricia L. Bellia, Surveillance
    Law Through Cyberlaw’s Lens, 
    72 Geo. Wash. L. Rev. 1375
    , 1403 (2004) (“The conclusion that
    Miller, Smith, and like cases foreclose any claim of an expectation of privacy in communications
    held by a service provider fails to acknowledge the factual contexts of Miller and Smith themselves,
    15
    state supreme courts, in interpreting their own state laws, have expressly disagreed with
    those holdings and applied the Katz test to find that society recognizes a reasonable or
    legitimate expectation of privacy in such circumstances.44 Further, Congress stepped in to
    grant individuals privacy rights in certain bank records,45 suggesting that at least Congress
    believed that the Court took too narrow a view of societal expectations of privacy. The
    United States Supreme Court itself has since limited the third party doctrine in certain areas
    to suggest, for example, that one may have a reasonable expectation of privacy in certain
    types of information shared with certain types of people: in Ferguson v. City of
    Charleston,46 the Court found that doctors at state hospitals conducted an unreasonable
    search in violation of the Fourth Amendment by administering a diagnostic test in order to
    obtain evidence of a patient’s criminal drug use for law enforcement purposes where the
    patient had not consented to the procedure.47 The Court observed that, “[t]he reasonable
    as well as the doctrinal and normative underpinnings of those decisions. A broad reading of Miller
    and Smith is also fundamentally inconsistent with Katz.”); Colb, supra note 36, at 122 (“[T]reating
    exposure to a limited audience as identical to exposure to the world, means failing to recognize
    degrees of privacy in the Fourth Amendment context.”).
    44
    See, e.g., Com. v. Melilli, 
    555 A.2d 1254
    , 1259 (Pa. 1989) (“Telephone activities are largely of
    one piece, and efforts to create distinctions between numbers and conversational content are
    constitutionally untenable in our view.”); State v. Hunt, 
    450 A.2d 952
    , 956 (N.J. 1982) (“It is
    unrealistic to say that the cloak of privacy has been shed because the telephone company and some
    of its employees are aware of this information. Telephone calls cannot be made except through the
    telephone company’s property and without payment to it for the service. This disclosure has been
    necessitated because of the nature of the instrumentality, but more significantly the disclosure has
    been made for a limited business purpose and not for release to other persons for other reasons.
    The toll billing record is a part of the privacy package.”); see also 1 LaFave, supra note 43, §
    2.7(c) (arguing that people have a legitimate expectation of privacy in telephone and bank records).
    45
    See Right to Financial Privacy Act, 
    12 U.S.C. §§ 3401-22
     (2012).
    46
    
    532 U.S. 67
     (2001).
    47
    
    Id. at 78
    .
    16
    expectation of privacy enjoyed by the typical patient undergoing diagnostic tests in a
    hospital is that the results of those tests will not be shared with nonmedical personnel
    without her consent.”48 Scholars have proposed a further limitation on the third-party
    doctrine to cover information shared with so-called “information fiduciaries”—a
    “counterparty to whom we entrust ‘personal [or] sensitive information’ today, and who,
    because they occupy a status ‘analogous to . . . traditional . . . fiduciaries,’ are obligated to
    use that information in ways that benefit us (or at least, that don’t work to our detriment).”49
    Moreover, even the Supreme Court itself has questioned how far the third-party doctrine
    48
    
    Id.
     But see California v. Greenwood, 
    486 U.S. 35
    , 40-41 (1988) (holding that the Fourth
    Amendment did not prohibit a warrantless search and seizure of garbage left for collection outside
    the curtilage of a home, and concluding that “having deposited their garbage ‘in an area particularly
    suited for public inspection . . . ,’ respondents could have had no reasonable expectation of privacy
    in the inculpatory items that they discarded.” (quoting United States v. Reicherter, 
    647 F.2d 397
    ,
    399 (3d Cir. 1981))). See also Bond v. United States, 
    529 U.S. 334
    , 338-39 (2000) (applying Katz
    test and citing Smith, 443 U.S. at 740) (observing that a bus passenger who places his bag in an
    overhead been necessarily exposes it to third parties, such as other passengers or bus employees,
    who “may move it for one reason for another” such as in order to fit other luggage, but “[h]e does
    not expect that other passengers or bus employees will, as a matter of course, feel the bag in an
    exploratory manner,” and therefore holding that “the agent’s physical manipulation of petitioner’s
    bag violated the Fourth Amendment.”).
    49
    See Brennan-Marquez, supra note 32, at 649 (quoting Jack Balkin, Information Fiduciaries in
    the Digital Age, Balkinization (Mar. 5, 2014, 4:50 PM), http://balkin.blogspot.com/2014/03/
    information-fiduciaries-in-digital-age.html [http://perma.cc/VN5D-JBZP]); see also Jack Balkin,
    Information Fiduciaries and the First Amendment, 49 U.C. Davis. L. Rev. 1130-31 (“We provide
    lots of information about ourselves — some of it quite sensitive — to people and organizations
    who owe us fiduciary duties or duties of confidentiality. And when we provide this information,
    we have, and should have, a reasonable expectation that they will respect our privacy. We have a
    reasonable expectation that disclosing this information to them, or allowing them to collect it from
    us, is not the same as making the information available to the public generally. . . . If I am right
    that new digital online service providers may be new kinds of information fiduciaries, then we
    should have reasonable expectations of privacy in at least some of the information about ourselves
    that we share with them.”); see also Richard A. Posner, Privacy, Surveillance, and Law, 
    75 U. Chi. L. Rev. 245
    , 248 (2008) (“[A] person would have to be a hermit to be able to function in our
    society without voluntarily disclosing a vast amount of personal information to a vast array of
    public and private demanders.”).
    17
    should be carried in this digital era and speculated that a more nuanced approach might be
    needed to address the complexities posed by modern technology.50
    Though Fourth Amendment jurisprudence is in flux as courts try to apply it to new
    technologies,51 the United States Supreme Court recently has affirmed, in Byrd v. United
    States, that, in order for there to be a Fourth Amendment violation, the complainant must
    have had a “property interest” or “reasonable expectation of privacy” under the Katz test
    50
    See, e.g., United States v. Jones, 
    565 U.S. 400
    , 417 (2012) (Sotomayor, J., concurring) (noting
    that the “third-party doctrine” is “ill suited to the digital age, in which people reveal a great deal
    of information about themselves to third parties in the course of carrying out mundane tasks” and
    that “it may be necessary to reconsider the premise that an individual has no reasonable expectation
    of privacy in information voluntarily disclosed to third parties.”); see also Riley v. California, 
    134 S. Ct. 2473
    , 2491 (2014) (observing that, “[t]o further complicate the scope of the privacy interests
    at stake [in cell phone searches], the data a user views on many modern cell phones may not in
    fact be stored on the device itself,” that “[c]loud computing is the capacity of Internet-connected
    devices to display data stored on remote servers rather than on the device itself,” and that “[c]ell
    phone users often may not know whether particular information is stored on the device or in the
    cloud, and it generally makes little difference.”); City of Ontario, Cal. v. Quon, 
    560 U.S. 746
    , 759
    (2010) (“The Court must proceed with care when considering the whole concept of privacy
    expectations in communications made on electronic equipment owned by a government employer.
    The judiciary risks error by elaborating too fully on the Fourth Amendment implications of
    emerging technology before its role in society has become clear.”); Kyllo, 
    533 U.S. at 33-34
     (“It
    would be foolish to contend that the degree of privacy secured to citizens by the Fourth
    Amendment has been entirely unaffected by the advance of technology.”).
    51
    In fact, the United States Supreme Court is currently considering whether the Fourth
    Amendment requires the government to obtain a warrant before accessing from third-party service
    providers “historical cell phone records revealing the location and movements of a cell phone user
    over the course of 127 days . . . .” See Brief for Petitioner at i., Carpenter v. United States, No.
    16-402 (U.S. Aug. 7, 2017), http://www.scotusblog.com/wp-content/uploads/2017/08/16-402-
    ts.pdf. In that case, officers obtained Carpenter’s cell site location information (CSLI)—data that
    revealed his location at nearly every moment over a four-month period—from his cellular service
    providers, MetroPCS and Sprint, pursuant to a court order (not a warrant) under the Stored
    Communications Act, 
    18 U.S.C. § 2703
    (d), based on a standard that was less than probable cause.
    See id. at 2, 5-6, 13. Carpenter argued before the Court that accessing long-term CSLI is a “search”
    that requires a warrant based on probable cause because the possibility that government officers
    might access that data based on less than probable cause intruded on citizens’ reasonable
    expectation of privacy, even though that information was held by a third party. See id. at 14-15.
    18
    in the area where the Fourth Amendment violation is alleged to have occurred.52 Justice
    Thomas wrote separately in Byrd to express his “serious doubts about the ‘reasonable
    expectation of privacy’ test from Katz.” But even he (joined by Justice Gorsuch) joined
    the Court’s opinion because “it correctly navigates our precedents, which no party has
    asked us to reconsider.”53
    Here, we need not explore the edges and boundary lines defining a person’s
    legitimate expectation of privacy in information shared with third parties such as Internet
    providers or social media platforms such as Facebook, Twitter, and Snapchat. Rather, we
    resolve the case on narrow grounds—namely, that the Fourth Amendment does not guard
    against the risk that the person from whom one accepts a “friend request” and to whom one
    voluntary disclosed such information might turn out to be an undercover officer or a “false
    friend.”      One cannot reasonably believe that such “false friends” will not disclose
    incriminating statements or information to law enforcement—and acts under the risk that
    one such person might actually be an undercover government agent. And thus, one does
    not have a reasonable expectation of privacy in incriminating information shared with them
    52
    Byrd v. United States, No. 16-1371, --- S. Ct. ----, 
    2018 WL 2186175
    , at *6-7 (U.S. May 14,
    2018) (“Indeed, more recent Fourth Amendment cases have clarified that the test most often
    associated with legitimate expectations of privacy, which was derived from the second Justice
    Harlan’s concurrence in Katz v. United States, 
    389 U.S. 347
     (1967), supplements, rather than
    displaces, ‘the traditional property-based understanding of the Fourth Amendment.’” (quoting
    Florida v. Jardines, 
    569 U.S. 1
    , 11 (2013))).
    53
    Id. at *12 (Thomas, J., concurring).
    19
    because that is not an expectation that the United States Supreme Court has said that society
    is prepared to recognize as reasonable.54
    To be clear, there are prohibitions against wiretapping conversations as they are
    happening absent a court order.55 And the privacy of emails or the servers where they are
    stored is not at issue. We only hold that, as between Everett and his “false friend,” the
    undercover Detective Landis, Everett assumed the risk that whoever was behind that
    account was a law enforcement officer, and, thus, there was no reasonable expectation of
    privacy that shields the incriminating information he shared.
    Finally, Everett argues that Detective Landis must have had reasonable suspicion of
    criminal activity before resorting to “ruse, fabrication, or deception” in obtaining his
    54
    Our holding under the Delaware Constitution is similarly limited. Our Article I, Section 6 is
    broader than the Fourth Amendment. See, e.g., Jones v. State, 
    745 A.2d 856
    , 866 (Del. 1999)
    (recognizing that the Pennsylvania Supreme Court found that the search and seizure provision in
    Pennsylvania Constitution’s “reflected different and broader protections than those guaranteed by
    the Fourth Amendment” and determining that “[w]e reach the same conclusion with regard to the
    search and seizure provision in the Delaware Constitution based upon its historical convergence
    for more than two hundered years with the same provision in the Pennsylvania Constitution.”); see
    also Wheeler v. State, 
    135 A.3d 282
    , 298 n.71 (Del. 2016) (noting “three cases in which this Court
    held that our State Constitution provides somewhat broader constitutional protections.”). We do
    not foreclose the possibility that this Court might conclude that, as to other issues that might arise
    in this developing area of search and seizure law, our State Constitution is more protective of those
    rights than the Fourth Amendment.
    55
    See Clifford S. Fishman & Anne T. McKenna, Wiretapping and Eavesdropping § 1:10 (“Title
    III [of the Omnibus Crime Control and Safe Streets Act of 1968, P.L. No. 90-351, 
    82 Stat. 197
    ,
    211 (1968), codified at 
    18 U.S.C. §§ 2510
     et seq.] is a detailed legislative scheme which specifies
    who may authorize an investigator to apply for a court order, the information an application must
    contain and the findings a judge must make before issuing the order, how the order is to be
    executed, how recordings of intercepted conversations are to be secured, who must eventually
    receive notice that phone or other communications facility was tapped or a location was bugged,
    and a host of other details.”); 11 Del. C. § 2402(c)(3) (authorizing government wiretapping for
    limited investigative purposes only after obtaining a Superior Court order under § 2407); 11 Del.
    C. § 2407(c)(1)(a)-(d) (providing that a judge may issue an ex parte order “authorizing interception
    of wire, oral or electronic communications” only if certain requirements are satisfied).
    20
    consent in order for that consent to be considered valid. In Hoffa v. United States, “[t]he
    argument [was] that [the informant’s] failure to disclose his role as a government informant
    vitiated the consent that the petitioner gave” for the agent’s access to criminal
    wrongdoing.56 But the United States Supreme Court rejected that argument recognizing
    that, “[t]he Fourth Amendment does not protect ‘a wrongdoer’s misplaced belief that a
    person to whom he voluntarily confides his wrongdoing will not reveal it.’”57 If one allows
    others to have access to his or her information that contains evidence of criminal
    wrongdoing, then that person assumes the risk that they might expose that information to
    56
    Hoffa, 
    385 U.S. at 300
    .
    57
    Henry v. State, 
    945 A.2d 594
    , 
    2008 WL 623208
    , at *3 n.16 (Del. 2008) (TABLE) (quoting
    United States v. Lee, 
    359 F.3d 194
    , 199-200 (3d Cir. 2004) (quoting Hoffa, 
    385 U.S. at 302
    )); see
    also Lewis v. United States, 
    385 U.S. 206
    , 209 (1996) (“[I]n the detection of many types of crime,
    the Government is entitled to use decoys and to conceal the identity of its agents,” but noting that
    “[t]he various protections of the Bill of Rights, of course, provide checks upon such official
    deception for the protection of the individual.”); see Schneckloth v. Bustamonte, 
    412 U.S. 218
    , 241
    (1973) (“There is a vast difference between those rights that protect a fair criminal trial and the
    rights guaranteed under the Fourth Amendment. Nothing, either in the purposes behind requiring
    a ‘knowing’ and ‘intelligent’ waiver of trial rights, or in the practical application of such a
    requirement suggests that it ought to be extended to the constitutional guarantee against
    unreasonable searches and seizures.”); Colb, supra note 36, at 149 (“[A] lack of information that
    would vitiate a waiver does not categorically invalidate consent.”); Illinois v. Rodriguez, 
    497 U.S. 177
    , 187 (1990) (“[W]hat is at issue when a claim of apparent consent is raised is not whether the
    right to be free of searches has been waived, but whether the right to be free
    of unreasonable searches has been violated.”); United States v. Longoria, 
    177 F. 3d 1179
    , 1183
    n.2 (10th Cir. 1999) (stating that, “[i]f a defendant . . . knowingly exposes his conversation to
    accomplices, even in a room not accessible to the general public, his conversations are not subject
    to Fourth Amendment protection from disclosure by such accomplices,” and that, defendant “had
    no reasonable expectation that the person in whose presence he conducts conversations will not
    reveal those conversations to others.”); Pennell v. State, 
    602 A.2d 48
    , 54 (Del. 1991) (rejecting the
    defendant’s argument that an officer was not legally in a position to view evidence in plain view
    because, even though the defendant believed that the officer was a prostitute, the defendant invited
    the officer to approach and enter the defendant’s van) (citing Lewis, 
    385 U.S. at 210-12
    ).
    21
    law enforcement—or they might be undercover officers themselves.58 As the United States
    Supreme Court has put it, “[t]he risk of being . . . betrayed by an informer or deceived as
    to the identity of one with whom one deals is probably inherent in the conditions of human
    society” and “is the kind of risk we necessarily assume whenever we speak.”59 In United
    States v. White,60 a plurality of the United States Supreme Court followed Hoffa and
    similarly observed that, “[i]f the law gives no protection to the wrongdoer whose trusted
    accomplice is or becomes a police agent, neither should it protect him when that same agent
    has recorded or transmitted the conversations which are later offered in evidence to prove
    the State’s case.”61
    58
    See, e.g., Palmieri, 72 F. Supp. 3d at 210 (“When a Facebook user allows ‘friends’ to view his
    information, the Government may access that information through an individual who is a ‘friend’
    without violating the Fourth Amendment.”). In addition, Detective Landis was aware that Everett
    was a person prohibited from possessing deadly weapons due to violent felony convictions.
    Although our holding here need not rely upon this fact, the special nature of probationary
    supervision results in curtailed rights of a probationer as compared to those of an ordinary citizen.
    See Fuller v. State, 
    844 A.2d 290
    , 291 (Del. 2004); see also Griffin v. Wisconsin, 
    483 U.S. 868
    ,
    873-74, 880 (1987) (holding that a warrantless search of a probationer’s home was “reasonable”
    within the meaning of the Fourth Amendment, and noting that the special nature of probationary
    supervision justified a departure from the usual warrant and probable cause requirements for a
    search); McAllister v. State, 
    807 A.2d 1119
    , 1124 (Del. 2002) (“As the United States Supreme
    Court has observed, ‘inherent in the very nature of probation is that probationers do not enjoy the
    absolute liberty to which every citizen is entitled.’” (quoting Griffin, 
    483 U.S. at 874
    )).
    59
    Hoffa, 
    385 U.S. at 303
     (quoting Lopez v. United States, 
    373 U.S. 427
    , 465 (1963) (Brennan, J.,
    dissenting)).
    60
    
    401 U.S. 745
     (1971).
    61
    
    Id. at 752
    . In White, the plurality found no Fourth Amendment violation where a radio
    transmitter was concealed on the informant’s body, and police then monitored the informant’s
    conversations with the defendant, including one that occurred in the defendant’s home. See also
    Lopez v. United States, 
    373 U.S. 427
    , 439 (1963) (finding no Fourth Amendment violation where
    an undercover officer gained entry into the defendant’s office with his consent and then recorded
    his conversations with the defendant because “[t]he Government did not use an electronic device
    to listen in on conversations it could not otherwise have heard. Instead, the device was used only
    to obtain the most reliable evidence possible of a conversation in which the Government’s own
    agent was a participant and which that agent was fully entitled to disclose.”); United States v. Lee,
    22
    In sum, we agree with the trial court’s conclusion that the Detective’s viewing of
    Everett’s Facebook page did not violate the Fourth Amendment or Article I, Section 6 of
    the Delaware Constitution.
    D.      Conclusion
    For the reasons set forth above, we AFFIRM.
    
    359 F.3d 194
    , 203 (3d Cir. 2004) (finding no Fourth Amendment violation where officers
    videotaped defendant’s conversations with an informant in the defendant’s hotel suite with a
    camera that they had installed before defendant occupied the room); United States v. Myers, 
    692 F.2d 823
    , 859 (2d Cir. 1982) (“[Defendant’s] conversations with undercover agents in whom he
    chose to confide were not privileged, and mechanical recordings of the sights and sounds to which
    the agents could have testified were proper evidence.” (citing White, 
    401 U.S. at 749-53
    )).
    23