STATE OF FLORIDA v. JEFFREY DARTER ( 2022 )


Menu:
  •        DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA
    FOURTH DISTRICT
    STATE OF FLORIDA,
    Appellant,
    v.
    JEFFREY DARTER,
    Appellee.
    No. 4D22-308
    [November 2, 2022]
    Appeal from the Circuit Court for the Fifteenth Judicial Circuit, Palm
    Beach County; Kirk Volker, Judge; L.T. Case No. 502019CF011634AMB.
    Ashley Moody, Attorney General, Tallahassee, and Sorraya M. Solages-
    Jones, Assistant Attorney General, West Palm Beach, for appellant.
    Michael Salnick and Lisa Viscome of Law Offices of Salnick & Fuchs,
    P.A., West Palm Beach, for appellee.
    GERBER, J.
    After the state charged the defendant with possessing child
    pornography images, the defendant obtained the circuit court’s order
    granting his motion to suppress the images. The defendant’s motion to
    suppress successfully argued that although detectives had obtained a
    court-approved search warrant before finding the images on his cell phone,
    the detectives—two days earlier—had unlawfully seized his cell phone from
    his grasp without a warrant and allegedly without probable cause or
    exigent circumstances, thereby tainting the detectives’ later court-
    approved search of his cell phone.
    The state argues the circuit court erred in granting the defendant’s
    motion to suppress. More specifically, the state argues the detectives were
    able to lawfully seize the defendant’s cell phone from his grasp without a
    warrant for two reasons: (1) the detectives had probable cause that the
    defendant’s cell phone contained child pornography images, based on the
    evidence which the detectives had discovered in their investigation, and
    based on the defendant’s reaction upon the detectives confronting him
    with that evidence; and (2) exigent circumstances arose when the
    defendant began swiping his cell phone in such a manner as to lead a
    reasonable person in the detectives’ position to believe that the defendant
    was deleting the suspected evidence from his cell phone.
    We agree with the state’s arguments, and therefore reverse the circuit
    court’s order granting the defendant’s motion to suppress.
    We present this opinion in five sections:
    1.   The evidence presented at the motion to suppress hearing;
    2.   The parties’ arguments on the motion to suppress;
    3.   The circuit court’s granting of the motion to suppress;
    4.   The parties’ arguments on appeal; and
    5.   Our review.
    1. The Evidence Presented at the Motion to Suppress Hearing
    At the motion to suppress hearing, the state’s sole witness was the
    investigation’s lead detective, who testified as follows.
    She had worked as a cyber-crimes detective for the past five years, and
    was part of the South Florida Internet Crimes Against Children task force.
    She primarily investigated child exploitation and pornography cases, for
    which she had received specialized training.
    In June 2019, the Department of Homeland Security contacted her with
    a cyber-tip report regarding a person named Jeff Darter, who had
    “uploaded one image of child pornography … in the KIK chatting
    application.” According to the lead detective, “KIK is similar to Snapchat.
    It’s a social media chatting platform [on which] [p]eople can chat with each
    other in chat rooms. … They can chat privately, send messages privately,
    share images, videos, [etc.].”
    The lead detective reviewed the uploaded image from the KIK account,
    and confirmed the image constituted child pornography. The KIK account
    revealed an associated email address. A subpoena for that email address’s
    account turned up “J.D.” as the subscriber’s initials, and “Jeff Darter” as
    a listed alias.
    The lead detective also was provided with the IP address from which
    the image was uploaded, and log-in records reflecting that the account had
    been accessed from the same IP address over a several-day period. The
    lead detective explained: “An IP … [or] internet protocol address … in
    layman’s terms … [is] an address for [a person’s] computer … [which is]
    2
    assigned to a router in [that person’s] home specifically for [that person],
    usually no one else.” According to the lead detective, an IP address can be
    tracked “to [a particular] residence or other location where somebody
    uploaded or was otherwise using the internet.” After determining that
    Comcast was the internet provider for the subject IP address, the lead
    detective subpoenaed Comcast for the IP address’s subscriber information.
    The subscriber was identified as Jeff Darter.
    Using the subpoena results and cyber-tip information, the lead
    detective requested the state attorney’s office to seek a residential search
    warrant for the defendant’s residence. However, the state attorney’s office
    denied the request, because the “Special Agent … who originally served
    the subpoena on the IP address of the [image] upload … listed the wrong
    date on the subpoena … [by using] the log-in [date] as opposed to the
    [image] upload [date] ….” By the time the lead detective was able to serve
    Comcast with another subpoena using the correct image upload date,
    Comcast no longer had records for that date.
    After the lead detective’s residential search warrant request was denied,
    the lead detective made two unsuccessful “knock and talk” attempts at the
    defendant’s residence.
    The lead detective testified that she and a second detective then decided
    to go to the defendant’s workplace. She conceded that, at that time, they
    did not have probable cause to get a search warrant for the defendant’s
    cell phone or work computer. However, the lead detective was aware that,
    based on the nature of the defendant’s employment, she would not need
    the defendant’s consent to search his work computer.
    When the lead detective and the second detective arrived at the
    defendant’s workplace, they identified themselves to the defendant’s
    supervisor. Without disclosing any details about their investigation, the
    detectives told the supervisor that they needed to speak to the defendant
    about an investigation. The detectives then went to the defendant’s office,
    introduced themselves, and began recording their conversation with him.
    The circuit court admitted the recording into evidence without objection.
    On the recording, the detectives read the defendant his Miranda rights,
    which the defendant acknowledged he understood. A fourteen-minute
    interview then occurred.
    Because the interview’s details, in conjunction with the events which
    occurred immediately after the interview, are crucial to our determination
    of whether probable cause and exigent circumstances existed for the
    3
    warrantless seizure of the defendant’s cellphone from his grasp, we provide
    those details here (with emphasis added):
    LEAD DETECTIVE: Do you have social media?
    DEFENDANT: Uh, I have a Facebook page. I don’t ever use
    it but it’s out there.
    LEAD DETECTIVE: Do you have any others?
    DEFENDANT: No.
    LEAD DETECTIVE: What about chatting applications, like
    Snapchat, KIK?
    DEFENDANT: I think I have those. I don’t think – I don’t use
    them. I do have accounts on Snapchat maybe and –
    LEAD DETECTIVE: What about KIK?
    DEFENDANT: Not that I know of.
    ….
    LEAD DETECTIVE: Okay. All right, so basically just to let
    you know why I am here today is that I received information
    from KIK, okay.
    DEFENDANT: Okay.
    LEAD DETECTIVE: That an image of child pornography was
    uploaded to another use from your account, your KIK
    account.
    DEFENDANT: All right.
    LEAD DETECTIVE: Can you tell me about that?
    DEFENDANT: No. Like I said, I don’t – don’t use KIK. I don’t
    know anything about that. But I’m not a child pornographer,
    no.
    ….
    4
    LEAD DETECTIVE: [D]o you know this email, [email address
    deleted here]?
    DEFENDANT: No.
    LEAD DETECTIVE: First name J.D.?
    DEFENDANT: Don’t know that one.
    LEAD DETECTIVE: Okay. But you did have KIK, right?
    DEFENDANT: Yeah, I don’t know. I may still have it, I don’t
    even know, but I don’t use it.
    LEAD DETECTIVE: What was the name that you used to –
    DEFENDANT: My God, I don’t have any idea.
    LEAD DETECTIVE: Does            [username      matching      e-mail
    address] ring a bell?
    DEFENDANT: No.
    LEAD DETECTIVE: Okay. So, let’s see, it looks like, I mean,
    this is directly from KIK.
    DEFENDANT: Okay.
    LEAD DETECTIVE: All right. And it shows your username
    is [username deleted here], first name Jack Darten. But then
    it shows you changed your name the end of December of 2015
    to Jeff Darten. 1
    DEFENDANT: Again, 2015?
    LEAD DETECTIVE: Yes.
    DEFENDANT: Okay, maybe. I don’t know.
    LEAD DETECTIVE: Okay. So, I mean, [KIK] reported from –
    directly from them that you uploaded an image of child
    1The state argued the defendant had intentionally changed his first name and then
    misspelled his last name in an attempt to disguise his identity.
    5
    pornography in the beginning of December [2018], and they
    shut down your account.
    DEFENDANT: Like I said, I don’t know any of that. I don’t
    know what they are – where that’s coming from.
    LEAD DETECTIVE: Was your KIK account ever deactivated?
    DEFENDANT: I don’t know.
    LEAD DETECTIVE: Okay.
    DEFENDANT: I don’t think I’ve ever even used it, but
    obviously I did something in 2015, so.
    LEAD DETECTIVE: I mean, it shows you were using it last
    year from November [2018] on.
    DEFENDANT: Last year?
    LEAD DETECTIVE: Uh-huh.         Have you ever seen child
    pornography before?
    DEFENDANT: I have, yeah.
    LEAD DETECTIVE: Okay. Where?
    DEFENDANT: Friends, other friends.
    LEAD DETECTIVE: Other friends.
    DEFENDANT: Yeah.
    LEAD DETECTIVE: Okay.
    DEFENDANT: Yeah.
    LEAD DETECTIVE: Tell me more about that.     Can you be
    more specific?
    DEFENDANT: No, not really. I mean, just to say that other
    people have had stuff that they have shown me and –
    6
    LEAD DETECTIVE: Could this have been something like
    that, something you came across to show one of your friends,
    being that they are into that type of material?
    DEFENDANT: I don’t – no, I don’t have that stuff. I’ve seen it
    from other people but I don’t have any of it.
    LEAD DETECTIVE:      Okay.
    DEFENDANT: So –
    LEAD DETECTIVE:      Who are these people that are interested
    in this material?
    DEFENDANT: Well, it was years ago. Nobody I even could
    name. I just – people have shown me things.
    LEAD DETECTIVE: Okay. Close friends, or, I mean, how
    many people are we talking?
    DEFENDANT: Acquaintances, yeah.        I mean, people that I
    have worked with, yeah.
    LEAD DETECTIVE: How does that come up?
    DEFENDANT: Uh, I don’t know. Just –
    LEAD DETECTIVE: How does that come up in conversation?
    DEFENDANT: Yeah, yeah, that’s the thing, yeah. Some
    things that they have shown me that I was not interested in,
    yeah, yeah.
    LEAD DETECTIVE: Okay. When was the last time?
    DEFENDANT: Uh, I don’t even know[].
    LEAD DETECTIVE: All right. What is child pornography to
    you? What does that mean to you?
    DEFENDANT: Well, I guess it would be like underage
    children or something.
    LEAD DETECTIVE: Engaged in –
    7
    DEFENDANT: Yeah, doing – unclothed or whatever.
    LEAD DETECTIVE: In sexual conduct, things of that nature?
    DEFENDANT: Oh, okay. All right.
    LEAD DETECTIVE: Okay.       The image that you sent to
    someone was an infant being penetrated by an adult male –
    DEFENDANT: Okay.
    LEAD DETECTIVE: – from your account. Just one image, not
    several. So we just want to make sure there is, you know, not
    anymore and you’re not actually hands on with anybody. It’s
    just something you’ve looked at.
    DEFENDANT: No, and like I said, I don’t even know about
    that. I don’t know anything about that, but, you know, it’s
    not my – it’s not interesting to me at all. It’s not my thing.
    LEAD DETECTIVE: Okay.
    SECOND DETECTIVE: This was something that was done
    accidentally and you didn’t realize what you did or is this —
    DEFENDANT: Like I said, I don’t know. I don’t even know
    anything about that. It could have been, I guess, but I don’t
    have any knowledge of that.
    LEAD DETECTIVE: Who is your internet service provider? Is
    it Comcast?
    DEFENDANT: Comcast, I think, yeah.
    LEAD DETECTIVE: How long have you had Comcast?
    DEFENDANT: Probably five or six years, something like that.
    LEAD DETECTIVE: So these people that you say you are
    friends with that are interested in this material, you met them
    at work. Where was that?
    8
    DEFENDANT: Well, that was – the one person I can think of,
    that was twenty years ago …. [He] w[as] starting a website to
    do that kind of thing and –
    ….
    LEAD DETECTIVE:      What do you mean, starting a website?
    DEFENDANT: This person had a website that did
    pornography of all kinds and I – he was showing me his
    website. I was not amused.
    LEAD DETECTIVE:      Who is this friend?
    DEFENDANT: I would rather not tell you that.
    LEAD DETECTIVE: Why would you protect someone who is
    interested in child pornography?
    DEFENDANT: I’m not protecting them. … It was twenty
    years ago. I’m sure they’re not doing it any more.
    LEAD DETECTIVE:      I highly doubt that.
    DEFENDANT: I highly doubt they are, but whatever. You’re
    welcome to your opinion.
    LEAD DETECTIVE: So when you – obviously you would use
    your phone to access KIK because you can’t on the computer.
    You are telling me you don’t have any child pornography
    whatsoever?
    DEFENDANT: No.
    LEAD DETECTIVE:      Would you consent to search your
    phone right now?
    DEFENDANT: Not right now, no.
    LEAD DETECTIVE:      Why not?
    DEFENDANT: I think that requires something more than just
    my giving you permission, right?
    9
    LEAD DETECTIVE:       No.
    DEFENDANT: Well, I’ve decided – I choose not to give you
    permission to get onto my phone.
    LEAD DETECTIVE: Okay. So there’s likely evidence of child
    pornography on your phone?
    DEFENDANT: I’m not saying that at all. I just don’t think I
    want to give you permission to get into my phone.
    LEAD DETECTIVE: Well, it wouldn’t be me. It would be my
    forensic team that I have outside to look at it.
    DEFENDANT: No, thanks.
    LEAD DETECTIVE:       Okay. Do you have any questions for
    me?
    DEFENDANT: No.
    ….
    LEAD DETECTIVE: Do you swear the information you
    provided to me today was the truth?
    DEFENDANT: Absolutely.
    LEAD DETECTIVE: Okay. [To the second detective] Can you
    think of anything else?
    ….
    SECOND DETECTIVE: Actually, real quick, so if it’s not you,
    then it’s going to probably be your wife that is doing this or –
    because it came from your house with your account, so.
    DEFENDANT: I don’t know.
    SECOND DETECTIVE: Okay. Have you ever seen your wife
    watch child pornography?
    DEFENDANT: No.
    10
    ….
    LEAD DETECTIVE: Okay.          You know, like [the second
    detective] said, it was uploaded from your residence[,] so it
    was either you or your wife and that’s what we need to get to
    the bottom of. Your name is all over – well, your name, Jeff
    Darter is on that account, but if you are saying that’s not you
    and you didn’t do that, then that’s something we are going to
    have to talk with her about.
    DEFENDANT: Okay.
    ….
    LEAD DETECTIVE: And just so you are aware, we’ve been
    alerted now that you’ve done this so you are on our radar with
    the Sheriff’s Office. So if you are still doing so, I suggest you
    stop.
    DEFENDANT: Okay.
    LEAD DETECTIVE: Because if we are alerted again that you
    were possessing, transmitting child pornography, you’re going
    to have a major issue.
    DEFENDANT: Yeah, well, it shouldn’t happen, but thank
    you.
    At that point, the detectives concluded the recorded interview. The lead
    detective testified that the defendant’s demeanor during the interview was
    “[o]ddly calm.” The two detectives then left the defendant’s office. The
    detectives did not tell the defendant whether they would be coming back
    or that he was prohibited from doing anything with his cell phone.
    The two detectives then went to the defendant’s supervisor’s office to
    request the supervisor’s consent to search the defendant’s work computer.
    The supervisor consented. The two detectives, joined by the supervisor
    and a third detective who specialized in forensic computer examination,
    went back to the defendant’s office.
    Upon entering the defendant’s office, the lead detective told him that
    the detectives needed to look at his work computer. The defendant initially
    refused to get up from his desk. The defendant’s supervisor demanded
    that the defendant get up from his desk. The defendant did so and went
    11
    from his office to a nearby break room which was visible to the lead
    detective. None of the detectives accompanied the defendant into the
    break room or told him that he could not do anything with his cell phone.
    However, the lead detective remained interested in looking at the
    defendant’s cell phone, if she could do so legally. So, while the lead
    detective watched the third detective begin examining the defendant’s
    work computer, she “maintain[ed] a visual” on the defendant in the break
    room for what she approximated was less than ten minutes.
    According to the lead detective, while the defendant was in the break
    room, she eventually noticed “[h]e was shaking. He was frantically swiping
    and pressing on [his cell phone’s] screen.” His demeanor “was the exact
    opposite [from the interview]. … [H]e was swiping, deleting, extremely
    nervous. It wasn’t a normal appearance.” The lead detective could not tell
    exactly what the defendant was doing with his phone, but she suspected
    that “he [was] deleting evidence.” (The trial court overruled defense
    counsel’s “speculation” objection to that observation.)
    Based on the lead detective’s suspicions, she and the second detective
    approached the defendant in the break room, and asked (or told) him to
    turn over his cell phone. The defendant said “no,” at which point the lead
    detective “grabbed [the cell phone] out of his hand.” The defendant then
    “pushed [the lead detective] and tried to grab the phone out of [her] hand.”
    A struggle ensued between the defendant and the two detectives. The lead
    detective ultimately seized the phone, and arrested the defendant for two
    counts of battery on a law enforcement officer.
    Over the next two days, the lead detective drafted an application for a
    warrant to search the defendant’s cell phone’s contents. Meanwhile, the
    search of the defendant’s work computer revealed adult pornography
    images, self-pornographic images taken at his work station, and one
    pornographic image of a person whom the detectives could not determine
    was a teenage child or an adult. The lead detective included these details
    in the application for a warrant to search the defendant’s cell phone.
    The duty judge approved the search warrant application.         The
    detectives searched the defendant’s cell phone and discovered 174 child
    pornography files.
    2. The Parties’ Arguments on the Motion to Suppress
    The defendant’s motion to suppress primarily argued that the lead
    detective had unlawfully seized his cell phone from his grasp without
    12
    probable cause that the cell phone contained child pornography images,
    and that the lead detective had “created the [exigent] circumstances which
    le[d] to” the phone’s seizure without a warrant. According to the
    defendant’s motion: “The seizure of the defendant’s cell phone was
    unlawful and any evidence obtained as a result of the seizure must
    therefore be suppressed. The warrant obtain[ed] subsequent to the
    unlawful seizure d[id] not cure the unlawful conduct.”
    The state’s response argued that the pre-interview evidence which the
    lead detective had discovered—linking the defendant to the KIK account to
    which the child pornography image had been uploaded—combined with
    the defendant’s reaction upon the detectives confronting him with that
    evidence, gave the lead detective probable cause to believe that the cell
    phone contained child pornography images. Further, the state argued, the
    exigent circumstances of the defendant potentially deleting evidence on his
    cell phone “was created by the [d]efendant’s actions, not the police,” and
    justified the lead detective’s warrantless seizure of the cell phone.
    “Importantly,” the state’s response asserted, “the cell phone … was only
    seized, not searched[,] prior to obtaining a warrant.”
    During the hearing on the motion, the state acknowledged the lead
    detective did not have probable cause to seize the defendant’s cell phone
    “[p]rior to [interviewing] him.” However, the state reiterated that the
    information which the lead detective had acquired before the interview,
    “coupled with [the defendant’s] answers to her [interview] questions and
    then his subsequent behavior, … gave her probable cause to seize the
    phone and apply for a [search] warrant.” The state elaborated:
    This is someone who has now been informed [that he is] a
    target of an investigation, that these are the allegations, …
    this is the information we have leading back to [him].
    He appears calm speaking with [the lead detective]. He
    then becomes resistant when he knows she is going to search
    [his work computer], goes to the break room, is left alone for
    the first time, completely changes his demeanor, [which] alerts
    her that something is going on. And that is why … she seized
    …, and … had [probable cause] to seize[,] the phone at that
    time.
    In rebuttal, defense counsel maintained that the lead detective lacked
    probable cause to believe that child pornography images were on the
    defendant’s cell phone:
    13
    Up to that point, the focus was … trying to get a warrant
    for his residence based on an IP address to that residence, not
    to a particular device …. So there was absolutely no evidence
    leading to the [defendant’s] [cell] phone, other than the fact
    that KIK is a [cell] phone application. … The[] [detectives]
    don’t have evidence of images, downloading or anything in
    particular to that particular phone at the time that they go to
    [the defendant’s] office. They are also acting on information
    that at that point is eleven months old.
    Defense counsel then argued that the defendant’s behavior did not
    create exigent circumstances for the lead detective’s warrantless seizure of
    the defendant’s cell phone:
    It just defies logic that [the lead detective] would sit down
    with [the defendant], tell him why she is there, and wait for
    that long period of time, … and then leaving him alone …, to
    conduct this forensic search, and then not until the very end
    decides that he is acting nervously. And acting nervously in
    and of itself is not sufficient. Obviously, she is going to
    speculate that he was deleting. … [S]he thought he was
    swiping. That could be … consistent [with] … [a] message
    coming up, I’m swiping it off because … I’m in the middle of
    work and I’m being investigated by law enforcement. It’s just
    as similar to … completely innocent activity as it is to
    destruction of evidence. …
    3. The Circuit Court’s Granting of the Motion to Suppress
    The circuit court orally granted the defendant’s motion to suppress:
    [T]o seize a cell phone under exigent circumstances, there
    must be probable cause existing at the time that the phone is
    seized … when there is no search warrant in order for it to be
    a lawful seizure. … [T]he [lead] detective herself has testified
    that at the time she went to the [defendant’s] [workplace] to
    speak with [the defendant], she did not have probable cause
    to obtain a search warrant …. Once she got there, after
    speaking with [the defendant], I do not believe that his
    answers to her questions would have provided the necessary
    probable cause. And then once he left the room, went into the
    break room and started accessing his cell phone, I don’t
    believe that, even assuming arguendo that that activity, if she
    had probable cause, would have permitted her to take the
    14
    phone under exigent circumstances, I think that activity itself
    does not provide additional probable cause to believe child
    pornography would be found on that phone. There are a lot of
    reasons why somebody could be using their phone. [The lead
    detective] can’t say what [the defendant] was doing. She can’t
    say he was deleting anything. And I’m not even sure if she
    could have said he was deleting anything, if that would have
    given probable cause to believe there is child pornography on
    the cell phone. But to sum up my findings, I do not believe
    there was probable cause to seize that phone at the time she
    took it; therefore, I don’t even think I need to address the
    exigent circumstances because you need probable cause to
    seize a cell phone under exigent circumstances. I don’t
    disbelieve the testimony of [the lead detective]. I think she
    was very credible ….
    ….
    So those are my rulings. Exigent circumstances, I think if
    [the lead detective] had probable cause, and maybe the Courts
    on an appeal would say … the [circuit court] is wrong, there
    was probable cause to seize the phone, I find that there were
    exigent circumstances to seize it, but I wasn’t finding probable
    cause before those circumstances existed. So I don’t think she
    had the right to seize it.
    (emphasis added). The circuit court later entered a written order
    summarizing its ruling, but deferring a finding on whether exigent
    circumstances existed to seize the defendant’s cell phone:
    This Court finds there was no probable cause to seize the
    [d]efendant’s cell phone at the time [the lead] [d]etective …
    took the phone. Based upon this finding, the Court does not
    need to address the exigent circumstance argument, for the
    [lead] [d]etective would need probable cause to seize the phone
    under exigent circumstances. …
    Accordingly it is … ORDERED that the [d]efendant’s …
    [m]otion be GRANTED and that all items seized and taken
    from the [d]efendant’s … cell phone are hereby suppressed.
    4. The Parties’ Arguments on Appeal
    On appeal, the state summarizes its primary argument as follows:
    15
    Based on the totality of the circumstances, the [circuit]
    court erred in granting [the defendant’s] motion to suppress
    the 174 child pornography images found on his cell phone.
    … [A]t the time [the lead detective] seized [the defendant’s]
    cell phone she believed, as an objectively reasonable officer,
    that there was a fair probability child pornography was on the
    phone. Hence, [she] had to respond quickly to the exigent
    circumstances for fear that [the defendant] was deleting or
    destroying evidence … [while] law enforcement was searching
    his work computer.
    The defendant’s answer brief summarizes his response as follows:
    In order for law enforcement to lawfully seize [the
    defendant’s] cell phone without a warrant, the [s]tate ha[d] the
    burden of showing at the time of the seizure law enforcement
    had both probable cause to believe that property contain[ed]
    … evidence of a crime and an applicable warrant exception,
    such as exigent circumstances. [The lead detective] lacked
    probable cause that [the defendant’s] cell phone contained
    evidence of a crime at the time she grabbed it from his hand.
    The seizure [therefore] was unlawful.
    5. Our Review
    We employ a mixed standard of review. See State v. Hankerson, 
    65 So. 3d 502
    , 506 (Fla. 2011) (“In reviewing a trial court’s ruling on a motion to
    suppress, the appellate courts defer to the trial court’s factual findings so
    long as the findings are supported by competent, substantial evidence,
    and review de novo the legal question of whether there was probable cause
    given the totality of the factual circumstances.”) (emphasis added).
    Here, applying de novo review to the legal question of whether the lead
    detective had probable cause to believe that child pornography images
    were on the defendant’s cell phone, we conclude the trial court erred in
    finding a lack of probable cause.
    As the Eleventh Circuit stated in U.S. v. Babcock, 
    924 F. 3d 1180
     (11th
    Cir. 2019):
    [T]he Supreme Court has interpreted the Fourth Amendment
    to allow a warrantless seizure when police can show both (1)
    16
    probable cause to believe that property contains contraband
    or evidence of a crime and (2) an applicable warrant exception,
    such as exigent circumstances. See, e.g., Kentucky v. King,
    
    563 U.S. 452
    , 459–60 … (2011) (citations omitted).
    Accordingly, absent either a warrant or probable cause plus
    an exception, police may not seize private property.
    Id. at 1186 (11th Cir. 2019).
    In the following two subsections, we will first address the probable
    cause requirement, and then we will address the exigent circumstances
    exception to the warrant requirement, as applied to the facts here.
    Probable Cause
    As the United States Supreme Court stated in Texas v. Brown, 
    460 U.S. 730
     (1983):
    [P]robable cause is a flexible, common-sense standard. It
    merely requires that the facts available to the officer would
    warrant a [person] of reasonable caution in the belief that
    certain items may be … useful as evidence of a crime; it does
    not demand any showing that such a belief be correct or more
    likely true than false. A practical, nontechnical probability
    that incriminating evidence is involved is all that is required.
    Moreover, our observation in United States v. Cortez, 
    449 U.S. 411
    , 418, 
    101 S. Ct. 690
    , 695, 
    66 L. Ed. 2d 621
     (1981),
    regarding “particularized suspicion,” is equally applicable to
    the probable cause requirement:
    The process does not deal with hard certainties, but
    with probabilities. Long before the law of probabilities
    was articulated as such, practical people formulated
    certain common-sense conclusions about human
    behavior; jurors as factfinders are permitted to do the
    same—and so are law enforcement officers. Finally, the
    evidence thus collected must be seen and weighed not
    in terms of library analysis by scholars, but as
    understood by those versed in the field of law
    enforcement.
    
    460 U.S. at 742
     (other internal citations and quotation marks omitted).
    17
    Applying that standard of review, we conclude the lead detective—based
    upon the combination of her pre-interview investigation, the defendant’s
    responses during the interview, and the defendant’s post-interview
    behavior in the break room—had probable cause to believe that the
    defendant’s cell phone contained child pornography images.
    While the state acknowledged the lead detective lacked probable cause
    to seize the defendant’s cell phone before the interview at the defendant’s
    workplace, the state later argued that the information which the lead
    detective had acquired before the interview, combined with the defendant’s
    answers during the interview, and his behavior after the interview,
    provided probable cause to believe that the defendant’s cell phone
    contained child pornography images.
    Indeed, before the interview, the lead detective had the following
    information:
    •   The Department of Homeland Security had received a cyber-tip
    report regarding a person named Jeff Darter, who had uploaded one
    image of child pornography in the KIK chatting application.
    •   Based on the lead detective’s review of the uploaded image from the
    KIK account, the image constituted child pornography.
    •   The KIK account revealed an associated email address for which the
    account subscriber’s initials were “J.D.” and for which a listed alias
    was “Jeff Darter.”
    •   The IP address from which the child pornography image was
    uploaded and log-in records reflected that the account had been
    accessed from the same IP address over a several-day period.
    •   After determining that Comcast was the internet provider for the
    subject IP address, the lead detective learned from Comcast that the
    IP address’s subscriber name was Jeff Darter.
    During the interview, the lead detective confirmed that the defendant
    had maintained a Comcast account. The lead detective also acquired more
    information for probable cause consideration:
    •   When the lead detective first asked the defendant if he ever had the
    KIK chatting application, the defendant answered, “Not that I know
    of.” When the lead detective then added into a later question that
    18
    “an image of child pornography was uploaded to another use from
    your account, your KIK account,” the defendant doubled down on
    his denial of a KIK account, answering, “Like I said, I don’t – don’t
    use KIK. I don’t know anything about that.”
    •   However, just a few minutes later, the defendant’s denial of having
    or using a KIK account changed to acknowledging the possibility of
    at least having had a KIK account. When the lead detective told the
    defendant that the KIK account was associated with the name “Jeff
    Darten” (just one letter off from the name “Darter”), the defendant
    answered, “Okay, maybe. I don’t know.”
    •   Then, just a few seconds later, the defendant acknowledged the
    possibility of having used a KIK account. When the lead detective
    asked the defendant, “Was your KIK account ever deactivated?”, the
    defendant answered “I don’t know … I don’t think I’ve ever even used
    it, but obviously I did something in 2015, so.” (emphasis added).
    •   Following the rapid evolution of the defendant’s answers regarding
    the KIK account, the defendant then gave evolving answers about
    whether he had ever seen child pornography images. The defendant
    answered he had been shown child pornography by people whom he
    first described as “friends,” and then as “acquaintances,” and then
    as “people that I have worked with.” When the lead detective asked,
    “How does that come up in conversation?”, the defendant’s answer
    was nonresponsive, if not nonsensical: “Yeah, yeah, that’s the thing,
    yeah. Some things that they have shown me that I was not
    interested in, yeah, yeah.” When the lead detective then asked,
    “When was the last time?”, the defendant answered “Uh, I don’t even
    know[].” A few minutes later, when the lead detective asked the
    defendant where he had met friends at work who were interested in
    “this material,” he now explained the event occurred “twenty years
    ago” when a friend was “starting a website … that did pornography
    of all kinds and I – he was showing me his website.” When the lead
    detective asked the defendant to identify the friend, the defendant
    refused to do so, presumptively stating, “It was twenty years ago.
    I’m sure they’re not doing it any more.”
    •   In the middle of the defendant’s evolving and evasive answers about
    whether he had ever seen child pornography, the lead detective
    expressly told the defendant, “the image that you sent to someone
    was an infant being penetrated by an adult male” and she wanted
    “to make sure there is, you know, not anymore and you’re not
    actually hands on with anybody. It’s just something you’ve looked
    19
    at.” At first, the defendant denied having seen the image, stating,
    “No, and like I said, I don’t even know about that. I don’t know
    anything about that, but, you know, it’s not my – it’s not interesting
    to me at all. It’s not my thing.” But when the second detective began
    asking the defendant if “[t]his was something that was done
    accidentally and you didn’t realize what you did,” the defendant
    interrupted the question to change his answer to acknowledging the
    possibility of having seen the image: “Like I said, I don’t know. I
    don’t even know anything about that. It could have been, I guess,
    but I don’t have any knowledge of that.” (emphasis added).
    •   At that point, the lead detective asked for the defendant’s consent to
    search his phone. The defendant refused. The detectives then
    warned the defendant that because the image had been uploaded
    from his residence, “then that’s something we are going to have to
    talk with [your wife] about,” “you are on our radar,” and “if we are
    alerted again that you were possessing, transmitting child
    pornography, you’re going to have a major issue.” After the first and
    second statements, the defendant merely responded “okay,” but
    ultimately responded to the third statement, “Yeah, well, it shouldn’t
    happen, but thank you.”
    After the interview—which the detectives concluded by telling the
    defendant that they were going to speak with his wife—his “oddly calm”
    behavior rapidly changed:
    •   When the detectives returned to the defendant’s office and told him
    that they needed to look at his work computer, he initially refused
    to get up from his desk. The defendant’s supervisor had to demand
    him to get up from his desk.
    •   Then, in less than ten minutes, while the defendant was in the break
    room, the lead detective eventually noticed “[h]e was shaking. He
    was frantically swiping and pressing on [his cell phone’s] screen.”
    His demeanor “was the exact opposite [from the interview]. … [H]e
    was swiping, deleting, extremely nervous. It wasn’t a normal
    appearance.” Although the lead detective could not tell exactly what
    the defendant was doing with his cell phone, she suspected that “he
    [was] deleting evidence.”
    Applying the United States Supreme Court’s standard of review stated
    in Texas v. Brown, we conclude the combination of facts available to the
    lead detective before, during, and after the interview would “warrant a
    [person] of reasonable caution in the belief,” 
    460 U.S. at 742
    , that the
    20
    defendant’s cell phone contained evidence of child pornography images.
    While we cannot say that such a belief would have been “correct or more
    likely true than false,” we can apply our common sense to say that the
    information which the lead detective had gathered and observed
    reasonably would have provided her with a “practical, nontechnical
    probability” that incriminating evidence would be found on the defendant’s
    cell phone. See 
    id.
    The circuit court’s error in finding a lack of probable cause appears to
    have occurred when its reasoning deviated from the Supreme Court’s
    articulated standard of review. Rather than focusing on the probability of
    the lead detective’s belief that the defendant was frantically deleting
    evidence from his cell phone, the circuit court inadvertently focused on the
    lead detective’s inability to prove the certainty of her belief. As the circuit
    court reasoned, “There are a lot of reasons why somebody could be using
    their phone. [The lead detective] can’t say what [the defendant] was doing.
    She can’t say he was deleting anything.” (emphasis added). The circuit
    court’s focus on certainty rather than probability ran counter to the
    Supreme Court’s process for determining probable cause, especially given
    the lead detective’s specialized training and experience in cyber-
    pornography crimes against children. See 
    id.
     (“The process does not deal
    with hard certainties, but with probabilities … as understood by those
    versed in the field of law enforcement.”).
    Exigent Circumstances
    “The test of whether exigent circumstances exist is an objective one.”
    United States v. Tobin, 
    923 F.2d 1506
    , 1510 (11th Cir. 1991). “Whether
    exigent circumstances exist in a given case is a fact-specific inquiry that
    depends on the totality of the circumstances.” United States v. Arellano-
    Ochoa, 
    461 F.3d 1142
    , 1145 (9th Cir. 2006) (citing United States v. Banks,
    
    540 U.S. 31
    , 36 (2003)). As the United States Supreme Court stated in
    Banks:
    [W]e have treated reasonableness as a function of the facts
    of cases so various that no template is likely to produce
    sounder results than examining the totality of circumstances
    in a given case; it is too hard to invent categories without
    giving short shrift to details that turn out to be important in a
    given instance, and without inflating marginal ones. See, e.g.,
    Ohio v. Robinette, 
    519 U.S. 33
    , 39 … (1996) (“[W]e have
    consistently eschewed bright-line rules, instead emphasizing
    the fact-specific nature of the reasonableness inquiry”); Ker v.
    California, 
    374 U.S. 23
    , 33 … (1963) (reasonableness not
    21
    susceptible to Procrustean application); Go-Bart Importing Co.
    v. United States, 
    282 U.S. 344
    , 357 … (1931) (no formula for
    determining reasonableness; each case on its own facts and
    circumstances).
    
    540 U.S. at 36
    .
    One type of exigent circumstance is the imminent destruction of
    evidence, to which we also have applied an objective test:
    The government must show more than a subjective fear of
    imminent destruction of evidence; the fear must be objectively
    reasonable. In determining whether the agents reasonably
    feared imminent destruction of the evidence, the appropriate
    inquiry is whether the facts, as they appeared at the moment
    of entry, would lead a reasonable, experienced agent to believe
    that evidence might be destroyed before a warrant could be
    secured. In other words, “were the police unreasonable in not
    getting a warrant in the circumstances that confronted them?”
    Gilbert v. State, 
    789 So. 2d 426
    , 429 (Fla. 4th DCA 2001) (quoting United
    States v. Rivera, 
    825 F.2d 152
    , 156 (7th Cir. 1987)).
    Application of the exigent circumstances exception is “particularly
    compelling” in cases involving electronic files, which can easily and quickly
    be destroyed. Babcock, 924 F.3d at 1194; cf. United States v. Bradley, 
    488 Fed. Appx. 99
    , 103 (6th Cir. 2012) (“Courts have doubted the wisdom of
    leaving the owner of [an] easily-destructible [electronic device containing
    incriminating material] in possession of that [electronic device] once the
    owner is aware that law-enforcement agents are seeking a search
    warrant.”).
    Applying the above standards to the instant case, we conclude the facts
    would have led a reasonable, experienced agent—here, the lead detective—
    to believe that the defendant might be destroying incriminating evidence
    on his cell phone before a search warrant could be secured. After the
    defendant had been (1) confronted by the detectives with the evidence
    against him, (2) warned “that’s something we are going to have to talk with
    [your wife] about” and “you are on our radar,” and (3) ordered from his
    desk while the detectives searched his work computer, the defendant went
    into a nearby break room, where the lead detective saw him “shaking,”
    “frantically swiping and pressing on [his cell phone’s] screen,” exhibiting
    demeanor which “was the exact opposite [from the interview],” and
    “swiping, deleting, extremely nervous,” in what “wasn’t a normal
    22
    appearance.” Faced with those circumstances, the lead detective was not
    unreasonable in seizing the defendant’s cell phone until she could secure
    a search warrant for the cell phone.
    In reaching our decision, we reject the defendant’s argument that the
    detectives’ actions created the exigent circumstances leading to the
    warrantless seizure of his cell phone. Neither the detectives’ interview of
    the defendant, nor their on-site search of his work computer with his
    supervisor’s consent, constituted “engaging or threatening to engage in
    conduct that violates the Fourth Amendment.” Kentucky v. King, 
    563 U.S. 452
    , 462 (2011). Instead, as the state’s initial brief submits:
    Based on [the defendant’s] behavior in conjunction with
    the information [which the lead detective] gathered … up to
    the point of seizure as well as her experience with how quickly
    the evidence could be deleted, [the lead detective] objectively
    believed and feared that [the defendant] was deleting or
    destroying evidence of child pornography at the … time[] that
    law enforcement began forensically searching [the
    defendant’s] work computer (which ultimately revealed
    evidence of age-difficult … pornography). Therefore, seizing
    [the defendant’s] cell phone under these exigent
    circumstances was justified.
    Conclusion
    In sum, we conclude the lead detective lawfully seized the defendant’s
    cell phone without a warrant, based upon probable cause and exigent
    circumstances. We therefore reverse the circuit court’s order granting the
    defendant’s motion to suppress, and remand for the circuit court to enter
    an order denying the defendant’s motion to suppress.
    As a result of our conclusion above, we do not reach the state’s
    alternative arguments that the search warrant rendered the evidence
    admissible under the independent source doctrine, and that the circuit
    court erroneously conducted a de novo review of the duty judge’s
    determination that the search warrant affidavit contained sufficient
    probable cause. We also conclude that the defendant’s alternative
    arguments seeking affirmance lack merit, without further discussion.
    Reversed and remanded for proceedings consistent with this opinion.
    MAY and FORST, JJ., concur.
    23
    *        *        *
    Not final until disposition of timely filed motion for rehearing.
    24