State v. Andrews , 227 Md. App. 350 ( 2016 )


Menu:
  •                REPORTED
    IN THE COURT OF SPECIAL APPEALS
    OF MARYLAND
    No. 1496
    September Term, 2015
    ______________________________________
    STATE OF MARYLAND
    v.
    KERRON ANDREWS
    ______________________________________
    Leahy,
    Friedman,
    Thieme, Raymond G., Jr.
    (Retired, Specially Assigned)
    JJ.
    ______________________________________
    Opinion by Leahy, J.
    ______________________________________
    Filed: March 30, 2016
    “[M]odern cell phones . . . are now such a pervasive and insistent part of
    daily life that the proverbial visitor from Mars might conclude they were an
    important feature of human anatomy.”
    Riley v. California, 
    134 S. Ct. 2473
    , 2484 (2014).
    This case presents a Fourth Amendment issue of first impression in this State:
    whether a cell phone—a piece of technology so ubiquitous as to be on the person of
    practically every citizen—may be transformed into a real-time tracking device by the
    government without a warrant.
    On the evening of May 5, 2014, the Baltimore City Police Department (BPD) used
    an active cell site simulator, without a warrant, to locate Appellee Kerron Andrews who
    was wanted on charges of attempted murder.         The cell site simulator, known under the
    brand name “Hailstorm,” forced Andrews’s cell phone into transmitting signals that
    allowed the police to track it to a precise location inside a residence located at 5032 Clifton
    Avenue in Baltimore City. The officers found Andrews sitting on the couch in the living
    room and arrested him pursuant to a valid arrest warrant. The cell phone was in his pants
    pocket. After obtaining a warrant to search the residence, the police found a gun in the
    cushions of the couch.
    In the Circuit Court for Baltimore City, Andrews successfully argued that the
    warrantless use of the Hailstorm device was an unreasonable search under the Fourth
    Amendment of the United States Constitution. The court suppressed all evidence obtained
    by the police from the residence as fruit of the poisonous tree. The State, pursuant to
    Maryland Code (1973, 2013 Repl. Vol., 2015 Supp.), Courts and Judicial Proceedings
    Article (“CJP”), § 12-302(c)(4), now appeals the court’s decision to suppress that evidence.
    The specific questions before us, as framed by the State, are:
    1) Did the motions court err in finding that the use of a cellular tracking
    device to locate Andrews’s phone violated the Fourth Amendment?
    2) Did the motions court err in finding that Andrews did not have to show
    standing before challenging the search of the home where he was
    arrested?
    3) Did the motions court err in finding that the search warrant for the home
    where Andrews was located was invalid?
    4) Did the motions court err in excluding the items recovered in this case?
    We conclude that people have a reasonable expectation that their cell phones will
    not be used as real-time tracking devices by law enforcement, and—recognizing that the
    Fourth Amendment protects people and not simply areas—that people have an objectively
    reasonable expectation of privacy in real-time cell phone location information. Thus, we
    hold that the use of a cell site simulator requires a valid search warrant, or an order
    satisfying the constitutional requisites of a warrant, unless an established exception to the
    warrant requirement applies.
    We hold that BPD’s use of Hailstorm was not supported by a warrant or an order
    requiring a showing of probable cause and reasonable limitations on the scope and manner
    of the search. Once the constitutionally tainted information, obtained through the use of
    Hailstorm, was excised from the subsequently issued search warrant for 5032 Clifton
    Avenue, what remained was insufficient to establish probable cause for a search of that
    residence. Because the antecedent Fourth Amendment violation by police provided the
    only information relied upon to establish probable cause in their warrant application, those
    2
    same officers cannot find shelter in the good faith exception, and the evidence seized in
    that search withers as fruit of the poisoned tree. We affirm.
    BACKGROUND
    Andrews was positively identified via photographic array as the person who shot
    three people on April 27, 2014, as they were attempting to purchase drugs on the 4900
    block of Stafford Street in Baltimore City.1 He was charged with attempted first-degree
    murder and attendant offenses in connection with the shooting, and a warrant for his arrest
    was issued on May 2, 2014.
    Pen Register and Trap & Trace Order
    Unable to locate Andrews, Detective Michael Spinnato of the BPD confirmed
    Andrews’s cell phone number through a confidential informant, and then submitted an
    application in the Circuit Court for Baltimore City for a pen register/trap & trace order for
    Andrews’s cell phone.2       Specifically, Det. Spinnato requested authorization for the
    1
    The State later admitted that there were also two negative photo arrays.
    2
    As discussed further infra, pursuant to the Maryland Pen Register, Trap and Trace
    Statute, found at CJP § 10-4B-01 et seq. (“Maryland pen register statute”), a court having
    jurisdiction over the crime being investigated may authorize the use of a “pen register”
    and/or a “trap and trace device,” defined as:
    ‘Pen register’ means a device or process that records and decodes dialing,
    routing, addressing, or signaling information transmitted by an instrument or
    facility from which a wire or electronic communication is transmitted.
    CJP § 10-4B-01(c)(1). The statute continues, stating:
    ‘Trap and trace device’ means a device or process that captures the incoming
    electronic or other impulses that identify the originating number or other
    3
    “installation and use of device known as a “Pen Register\Trap & Trace and Cellular
    Tracking Device to include cell site information, call detail, without geographical limits,
    which registers telephone numbers dialed or pulsed from or to the telephone(s) having the
    number(s) . . . .” The application stated that Andrews was aware of the arrest warrant, and
    that to hide from police
    suspects will contact family, girlfriends, and other acquaintances to assist in
    their day to day covert affairs. Detective Spinnato would like to
    track/monitor Mr. Andrews’[s] cell phone activity to further the investigation
    an [sic] assist in Mr. Andrews’[s] apprehension.
    ***
    Your Applicant hereby certifies that the information likely to be obtained
    concerning the aforesaid individual’s location will be obtained by learning
    the numbers, locations and subscribers of the telephone number(s) being
    dialed or pulsed from or to the aforesaid telephone and that such information
    is relevant to the ongoing criminal investigation being conducted by the
    Agency.
    On May 5, 2014, Det. Spinnato’s application was approved in a signed order stating,
    in part:
    [T]he Court finds that probable cause exists and that the applicant has
    certified that the information likely to be obtained by the use of the
    above listed device(s) is relevant to an ongoing criminal investigation, To
    wit: Attempted Murder.
    ***
    (Emphasis in original). And, as requested in the application, the court,
    dialing, routing, addressing, and signaling information reasonably likely to
    identify the source of a wire or electronic communication.
    CJP § 10-4B-01(d)(1). Under Maryland law, an order for a pen register/trap & trace is
    issued without a warrant and on something less than probable cause.
    4
    ORDERED, pursuant to Section 10-4B-04 of the Courts and Judicial
    Proceedings Article . . . [Applicants] are authorized to use for a period of
    sixty (60) days from the date of installation, a Pen Register \ Trap & Trace
    and Cellular Tracking Device to include cell site information, call detail,
    without geographical limits . . .
    ***
    ORDERED, . . . [t]he Agencies are authorized to employ surreptitious or
    duplication of facilities, technical devices or equipment to accomplish the
    installation and use of a Pen Register \ Trap & Trace and Cellular Tracking
    Device, unobtrusively and with a minimum of interference to the service of
    subscriber(s) of the aforesaid telephone, and shall initiate a signal to
    determine the location of the subject’s mobile device . . . .
    (Emphasis added).
    Cell Phone in a Hailstorm
    As soon as Det. Spinnato obtained the pen register\trap & trace order on May 5, he
    sent a copy to the BPD’s Advanced Technical Team (the “ATT”). The ATT then issued a
    form request to the service provider (Sprint) for the following: subscriber information;
    historical cell site location information (“CSLI”) for the period from April 5 to May 5,
    2014; pen register data for 60 days; and precision GPS data from Andrews’s phone. 3 An
    additional request followed for “GPS Precise Locations and email.”
    3
    Two broad categories of CSLI may be sought from the service provider. The first
    is historical CSLI, which is used to look back through service provider records to determine
    a suspect’s location at a given point in the past. See, e.g., United States v. Graham, 
    796 F.3d 332
    , 343 (4th Cir. 2015) (“Historical CSLI identifies cell sites, or ‘base stations,’ to
    and from which a cell phone has sent or received radio signals, and the particular points in
    time at which these transmissions occurred, over a given timeframe. . . . The cell sites
    listed can be used to interpolate the path the cell phone, and the person carrying the phone,
    travelled during a given time period.”), reh’g en banc granted, 624 F. App’x 75 (4th Cir.
    2015). Law enforcement frequently uses historical CSLI to prove that a defendant was in
    the area where a crime of which he is accused occurred. The second category of CSLI is
    real-time data, used to track the whereabouts and movements of a suspect by using the cell
    5
    Later on the same day—May 5—Det. Spinnato began receiving emails from ATT
    with GPS coordinates for Andrews’s cell phone (within a range of a 200 to 1600 meter
    radius). Det. Spinnato and officers from the Warrant Apprehension Task Force (“WATF”)
    proceeded to the general area and waited until they received information from ATT that
    the cell phone was in the area of 5000 Clifton Avenue, Baltimore City. They proceeded to
    an area where there were approximately 30 to 35 apartments around a U-shaped sidewalk.
    Detective John Haley from ATT arrived and, using a cell site simulator known by the brand
    name “Hailstorm,” was able to pinpoint the location of the cell phone as being inside the
    residence at 5032 Clifton Avenue.4
    Det. Spinnato knocked on the door and, after obtaining the consent of the woman
    who answered, entered the residence along with several other officers. They found
    Andrews seated on the couch in the living room with the cell phone in his pants pocket.
    phone as a tracking device. See, e.g., Tracey v. State, 
    152 So. 3d 504
    , 507 (Fla. 2014),
    reh’g denied (Dec. 8, 2014). Here, the BPD obtained real-time location information from
    the service provider when it received the GPS coordinates associated with the cell phone
    from Sprint. Andrews’s motion to suppress, however, was focused primarily on the BPD’s
    ensuing use of a cell site simulator to directly obtain pin-point location data. Therefore, on
    appeal we do not address whether the real-time location information from Sprint should
    have been obtained under a warrant or special order.
    4
    True to its brand name, the Hailstorm device generates an electronic barrage that
    impacts all the mobile devices within its range. As noted in the amicus brief filed by the
    American Civil Liberties Union (“ACLU”) and Electronic Frontier Foundation (“EFF”)
    at page 3, the fact that cell site simulators actively locate phones by forcing them to
    repeatedly transmit their unique identifying electronic serial numbers, and then calculating
    the signal strength until the target phone is pinpointed, is found in several recent federal
    publications and cases, including a Department of Justice Policy Guidance: Use of Cell-
    Site     Simulator      Technology       2     (Sept.     3,     2015),     available     at
    https://www.justice.gov/opa/file/767321/download [https://perma.cc/K99L-H643].
    6
    Det. Spinnato arrested Andrews and secured the location until a search warrant could be
    obtained. Once they had the warrant, the BPD searched the home and found a gun in the
    couch cushions.
    Initial Hearings
    Andrews was indicted by a grand jury on May 29, 2014, on numerous charges
    related to the April 27, 2014 shooting. On July 1, 2014, the Assistant Public Defender
    representing Andrews filed an “omnibus” motion including requests for discovery and the
    production of documents. The State responded with an initial disclosure and supplemental
    disclosure on July 9 and 11, respectively. Those disclosures, however, failed to reveal the
    method used to locate Andrews on the date of his arrest.
    On November 3, 2014, defense counsel filed a supplemental discovery request
    seeking, inter alia, “[a]ll evidence indicating how Andrews was located at 5032 Clifton
    Avenue.” The State’s response to that request, dated January 8, 2015, stated, “[a]t this time
    the State does not possess information related to the method used to locate [Andrews] at
    5032 Clifton Avenue.” However, five months later defense counsel received an email from
    the Assistant State’s Attorney (“ASA”) assigned to the case indicating that it was her
    understanding that “the ATT used a stingray to locate[] your client via his cell phone,” but
    she was waiting for “the paperwork.” The next day, May 7, the ASA also notified defense
    counsel of exculpatory evidence in the form of a negative photo array that was conducted
    the previous January.
    On May 12, 2015, defense counsel requested that the court dismiss the case based
    on discovery violations and moved for suppression of evidence, including the gun, phone
    7
    records, and identification testimony. A few days later, on May 15, the State filed a
    supplemental disclosure, which provided:
    WATF did not have the Clifton Ave address as a possible location until ATT
    provided that information. Det. Spinnato recalls that he was in touch with
    Det. Haley from ATT. ATT was provided that information from Sprint in
    the form of GPS coordinates, Det. Spinnato received the same information
    either from Sprint directly, or forwarded from ATT. Det. Spinnato provided
    ATT with the phone number associated to Defendant from the shooting
    investigation and, [redacted in original]-Det. Spinnato recalls that ATT gave
    Det. Spinnato the Clifton Ave address in the afternoon/early evening on May
    5, 2014. . . .
    The State’s supplemental disclosure also identified a second negative photo array
    conducted on May 4, 2014.
    Andrews’s initial motions were heard in the circuit court on May 12, 21, and June
    4, 2015. At the conclusion of the hearing on June 4, the circuit court found that one of the
    lead investigators intentionally withheld exculpatory evidence—including both negative
    photo arrays. As a result, the circuit court partially granted the pending defense motion for
    sanctions and excluded that detective’s testimony from trial. The court declined to dismiss
    the case and denied the motion to exclude the gun and cell phone on the basis of the State’s
    withholding of discoverable materials. However, as a consequence of the State’s failure to
    timely disclose information concerning Hailstorm surveillance technology that was used
    by the BPD, the Court granted the defense additional time to file a motion to suppress.
    Motion to Suppress
    Andrews filed a Motion to Suppress—over 50 pages including exhibits—on June
    30, 2015, in which he challenged the BPD’s surreptitious use of the Hailstorm cell site
    simulator to search Andrews’s phone, without a warrant, under the Fourth Amendment to
    8
    the United States Constitution. Andrews moved to suppress all evidence obtained from
    5032 Clifton Avenue.
    During the ensuing hearing on the motion to suppress, held August 20, 2015, the
    State suggested, and the defense agreed, that the circuit court rely on the transcripts and
    exhibits from the earlier motions hearings for an understanding of the function of the
    Hailstorm device and its use by the BPD:
    [STATE’S ATTORNEY]: . . . The exact testimony that we’re going to hear
    about with regard to the Fourth Amendment issue Counsel heard as it related
    to the discovery issue because the discovery issue bled into the Fourth
    Amendment issue. So there is nothing new. There is nothing -- Counsel’s
    aware that the equipment is called Hailstorm not Stingray because of the
    testimony that Counsel heard and extracted from the detective as it relates to
    this very case. So there simply is, there is nothing new. We’re at the exact
    same issue that we were two months ago.
    THE COURT: So do we even need, do you need to call the witness or can I
    just rely on the transcript?
    [STATE’S ATTORNEY]: It would seem to me to rely on the transcript.
    ***
    THE COURT: . . . So the State is indicating that the testimony that the State
    would present today is the same testimony that was presented --
    [DEFENSE COUNSEL]: Right.
    THE COURT: -- there.
    [DEFENSE COUNSEL]: Right.
    THE COURT: And that’s in the transcript, and the Court can just rely on the
    transcript to rule on your motion.
    [DEFENSE COUNSEL]: Right.
    THE COURT: You’re fine with that?
    9
    [DEFENSE COUNSEL]: Yep.
    The court took a recess for several hours to review the motions and transcripts. The
    following excerpts from the June 4th hearing, entered as Defendant’s Exhibit 1C, pertain to
    the function of the cell site simulator:
    [DETECTIVE HALEY]: What happened in this case was, Detective
    Sp[innato] from our WATF, which is the Warrant Apprehension Unit,
    apparently interviewed somebody -- got a phone number. He then responds
    down here to the Circuit Court . . . and gets a Court Order signed.
    He then sends the Court order down to our office, depending on what
    the carrier is, Verizon, Sprint, T-Mobile, AT&T. We then send it to them. I
    ask for subscriber information, call-detail records.
    They provide us with GPS locations, in this case. And once we get all
    the information, then we have equipment that we can go out and locate cell
    phones.
    [DEFENSE COUNSEL]: Okay. When you say, we have equipment that we
    can locate cell phones, you’re talking about the Stingray equipment, is that
    what was used in this case?
    [DETECTIVE HALEY]: Yeah, it’s called the Hailstorm. It used to be --
    Stingray is kind of first generation.
    ***
    [DEFENSE COUNSEL]: Tell me what the Hailstorm does.
    [DETECTIVE HALEY]: What we get from the phone company is the
    subscriber information. So, when we get the subscriber information, it has a
    [sic] identifier on there, if you will, a serial number. We put that into the
    Hailstorm equipment. And the Hailstorm equipment acts like a cell tower.
    So, we go into a certain area, and basically, the equipment is looking for that
    particular identifier, that serial number.
    [DEFENSE COUNSEL]: Okay. And so, if a person is inside of a home, that
    equipment peers over the wall of the home, to see if that cell phone is behind
    the wall of that house, right?
    10
    [DETECTIVE HALEY]: Yes.
    [DEFENSE COUNSEL]: And it sends an electronic transmission through the
    wall of that house, correct?
    [DETECTIVE HALEY]: Yes.
    [DEFENSE COUNSEL]: Did you get a separate search warrant for that
    search into the home?
    [DETECTIVE HALEY]: You’d have to talk to Detective Spinnato about
    that. Because he’s the one that got the Court Order signed.
    [DEFENSE COUNSEL]: Did you do the search? You conducted the
    equipment in this -- you operated –
    [DETECTIVE HALEY]: Yes.
    [DEFENSE COUNSEL]: -- the equipment?
    [DETECTIVE HALEY]: Yes.
    ***
    [DEFENSE COUNSEL]: Tell me all of the information the Hailstorm can
    retrieve from a phone.
    [DETECTIVE HALEY]: It’s going to retrieve, like I said before, the serial
    number of the phone, depending on what kind of phone it is. It’s going to --
    there’s [sic] different identifiers. Like for Sprint, in this case, it’s called the
    MSID. And that’s like a ten-digit -- like a ten-digit number. So, it’s retrieving
    that. And there’s also the electronic serial number. It’s retrieving that. And
    that’s really it.
    [DEFENSE COUNSEL]: Can you capture the telephone calls as they’re
    being made?
    [DETECTIVE HALEY]: No.
    [DEFENSE COUNSEL]: And how do you know where the phone -- and it
    doesn’t capture any data on the phone?
    [DETECTIVE HALEY]: No.
    11
    [DEFENSE COUNSEL]: Are you sure?
    [DETECTIVE HALEY]: Yes.
    [DEFENSE COUNSEL]: So, how do you get information about where the
    phone is on the machine?
    [DETECTIVE HALEY]: Because when it captures that identifier that you
    put into the machine or the equipment, it then tells you -- it looks like a clock
    on the equipment. And it tells you where the signal’s coming from, like 12,
    1, 2, 3 o’clock (indicating). And it will give you like a reading. Like if it says
    1:00 at like an 80, well, then you know that you’re kind of close to it. But if
    it says 1:00 at like a 40, then you know that you’re probably within, I don’t
    know, probably, you know, 20 yards of it.
    [DEFENSE COUNSEL]: The person doesn’t have to be using their phone
    for you to get that information, do they?
    [DETECTIVE HALEY]: Actually, if they’re on their phone, then they’re
    already connected to -- in this case, the Sprint network. And we’re not going
    to be able to pull them off of that until they’re -- until they hang -- until they
    hang the call up.
    [DEFENSE COUNSEL]: So, they hang the call up. And the phone can be in
    their pocket, right?
    [DETECTIVE HALEY]: Correct.
    [DEFENSE COUNSEL]: And then you’re reaching in to grab an electronic
    signal about where that phone is? It’s not pinging, in other words, right?
    ***
    MR. HALEY: Like I said, our equipment acts like a cell tower. So, it draws
    the phone to our equipment.
    [DEFENSE COUNSEL]: But you just said, if the person’s on the phone, your
    equipment won’t work, right?
    [DETECTIVE HALEY]: Correct.
    12
    [DEFENSE COUNSEL]: So, it doesn’t act like a cell tower, because you can
    find the phone only when they are not on the phone, correct?
    [DETECTIVE HALEY]: Well, I would say it does act like a cell tower,
    because the only time that you’re going to connect -- the only time that you’re
    going to connect to the network, or to a tower is when you go to try to use it.
    [DEFENSE COUNSEL]: But you’re connecting to where the phone is, when
    they’re not on the phone, didn’t you just say that
    [DETECTIVE HALEY]: Maybe I’m getting confused, or I’m not
    understanding what you’re asking me.
    [DEFENSE COUNSEL]: My question to you was, for example, I have my
    phone in my pocket. And I’m sitting in my house, right?
    [DETECTIVE HALEY]: Okay.
    [DEFENSE COUNSEL]: And you want to know where I am, correct?
    [DETECTIVE HALEY]: Okay.
    ***
    [DEFENSE COUNSEL]: When I am not on my phone, you will drive by my
    house, and you will get a signal from my phone indicating where I am, right?
    [DETECTIVE HALEY]: Correct.
    [DEFENSE COUNSEL]: If I am using the phone, you won’t get that signal,
    right?
    [DETECTIVE HALEY]: Correct.
    [DEFENSE COUNSEL]: So, the phone cannot be in use. You are searching
    for my phone as you’re driving through my neighborhood, right?
    [DETECTIVE HALEY]: Yes.
    [DEFENSE COUNSEL]: And in order to get to my phone, you are sending
    an electronic signal into my house, right?
    [DETECTIVE HALEY]: Yes.
    13
    When the hearing resumed, the court made several preliminary findings, and invited
    counsel to respond. In regard to the pen register/trap & trace order, the court observed:
    I don’t find that Judge Williams’ order is invalid as a pen register or trap and
    trace, but I do find that the order does not authorize the use of Hailstorm and
    I . . . invite the State to tell me otherwise.
    ***
    So this is very different from an order authorizing, for example, GPS or cell
    site information, because that is information that’s generated by the phone.
    And my understanding of this equipment is essentially that it’s forcing the
    phone to emit information, or its taking information from the phone that the
    phone is not sort of on its own generating at the time which is very different.
    On the issue of whether Andrews’s arrest was lawful, the parties acknowledged that
    a valid warrant was outstanding for his arrest. However, the court questioned whether, as
    argued by defense counsel, Andrews’s presence at 5032 Clifton Avenue “or the warrant
    they got as a result of him being there is fruit of the poisonous tree because there was a
    violation of his Fourth Amendment rights by [Det. Haley] using the Hailstorm on this
    phone to locate him at that residence in the first place.” Looking then to the application
    for the warrant to search 5032 Clifton Avenue, the court noted that there was no
    independent corroboration for the warrant because, “all it says he was located at this
    address and so we want to search this address. I mean that’s really all it says.”
    After hearing argument, the circuit court found that “the use of the Hailstorm
    violates the Defendant’s Fourth Amendment rights,” and “any information generated from
    the use of the Hailstorm [must] be suppressed.” The court continued on the record:
    And so just so that I’m clear, it means that the jury cannot hear any
    testimony or evidence about information obtained from the Hailstorm,
    obtained through the Hailstorm device. And just so that I’m clear, it’s my
    14
    understanding that the Hailstorm device is what told the police that the
    Defendant was at that location.
    And so that includes any testimony or evidence then that the
    Defendant was at that location, if that’s what -- because that’s what the
    Hailstorm told the police. And so the jury would be prohibited from hearing
    evidence or testimony of that. It does not invalidate the arrest or the search
    [incident to] the arrest with the phone that’s in his pocket.[5]
    Now anything that came off the phone, again if it came through the
    Hailstorm device it is suppressed. There can be no evidence or testimony
    about it. And then again, any police knowledge that the Defendant was at that
    location again also suppressed, so the jury would not be able to hear any
    evidence or testimony of that.
    So then that leaves us with the fruit of the poisonous tree argument for
    the search and seizure warrant. I reviewed the warrant and it literally says the
    Defendant was in there so now we need a warrant. And information
    generated from the use of the Hailstorm be suppressed, that’s all that it is.
    And so I analyze this different, a little bit different from a normal sort of
    motion to suppress a search and seizure warrant or even Franks in terms of
    standing.
    I don’t -- I understand the State’s argument in terms of standing and
    this not being his residence, and the Defense’s argument that he was at a
    minimum an overnight guest and has some reasonable expectation of
    privacy. I don’t think I need to reach those issues because the warrant is really
    just fruit of the poisonous tree of the illegally obtained information about the
    Defendant’s location. That’s what it is.
    And so I am granting the suppression of that for that very reason. And
    so that the record is clear – and I know that the State is asking to take an
    appeal, the record is clear. The ruling of the Court is that the government
    violated the Defendant’s Fourth Amendment rights by essentially using the
    Hailstorm to locate him at that residence.
    The State noticed its appeal on September 3, 2015.
    5
    Mr. Andrews did not challenge the legality of his arrest or search incident to arrest,
    either in the circuit court or before this Court. He did, however, seek to suppress the cell
    phone, but that motion was denied and Mr. Andrews did not file a cross-appeal to contest
    that ruling.
    15
    DISCUSSION
    Motion to Dismiss
    Before turning to the merits, we must address Andrews’s motion to dismiss this
    appeal on the ground that the notice of appeal was defective, and therefore, not filed within
    the time prescribed by Rule 8-202.
    The State filed its notice of appeal on September 3, 2015; however, the signed
    certificate of service—indicating that a copy of the notice was “mailed first-class, postage
    prepaid” on that same day—failed to list the party that was served. Andrews acknowledges
    that a copy of the notice was delivered to the Office of the Public Defender on September
    4, 2015. Nevertheless, Andrews argues that the State’s notice did not comply with the
    certificate of service requirements of Maryland Rule 1-323, and that the clerk should not
    have accepted the filing. Consequently, according to Andrews, no valid notice of appeal
    was filed in this case. The State concedes that the failure to name the party to be served
    was a defect in the certificate of service, but maintains the clerk was required to accept the
    filing because the certificate complied with the literal requirements of Rule 1-323. The
    State urges that it would be improper to dismiss the appeal because there is no dispute that
    the opposing party was served in a timely fashion.
    Maryland Rule 1-323 directs that the court clerk may not accept for filing a pleading
    or other paper requiring service, unless it is accompanied by “an admission or waiver of
    service or a signed certificate showing the date and manner of making service.” In Director
    of Finance of Baltimore City v. Harris, this Court addressed whether a certificate of service
    that failed to identify all the persons upon whom service was required should have been
    16
    rejected for filing by the court clerk. 
    90 Md. App. 506
    , 513-14 (1992). Looking to the
    1984 revision of the Maryland Rules that produced the current Rule 1-323, this Court
    observed:
    Under the old Rule, the clerk may have had some obligation to determine
    whether the certificate actually showed service on the “opposite party.” But,
    as noted, that obligation, if it ever did exist, has been eliminated. . . . The
    obligation of the clerk under the current Rule is simply to assure that there
    is, in fact, an admission, a waiver, or a certificate showing the date and
    manner of service. If such a certificate is attached to the paper, the clerk
    must file the paper, leaving it then to the parties or the court to deal with any
    deficiency.[6]
    More recently, in Lovero v. Da Silva, this Court clarified that, by mandating that
    proof of service (or a waiver of service) appear on each pleading or paper, “Rule 1-323
    assures the court . . . that each party has been duly notified before action is taken by the
    court in response to or as a result of the subject pleading or paper.” 
    200 Md. App. 433
    ,
    6
    This Court further illuminated the evolution of Rule 1-323 stating:
    Rule 1-323 is derived ultimately from Rule 1(a)(2), Part Two, V, of
    the General Rules of Practice and Procedure, adopted by the Court of
    Appeals and approved by the General Assembly pursuant to 1939 Md. Laws,
    ch. 719, § 35A. Rule 1(a)(2) provided, in relevant part, that a paper “shall not
    be received and filed by the clerk of the court unless accompanied by an
    admission or proof of service of a copy thereof upon the opposite party or
    his attorney of record in accordance with this rule.” (Emphasis added.) Other
    parts of the Rule prescribed how service was to be made. That Rule was
    carried over into the Maryland Rules of Procedure as Rule 306 a.2., which
    stated that “[t]he clerk shall not accept or file any paper requiring service
    other than an original pleading unless it is accompanied by an admission or
    proof of service of a copy thereof upon the opposite party, or his attorney of
    record.” (Emphasis added.)
    Until the 1984 revision of the Maryland Rules, the Rule remained in
    that form.
    
    Harris, 90 Md. App. at 511-12
    .
    17
    446 (2011). We determined that Lovero’s notice of appeal should have been rejected by
    the clerk, explaining that
    [w]here, as in the instant case, the notice of appeal contains no proof of
    service whatsoever, we have no basis upon which to conclude that the notice
    of appeal was served on the opposing party or parties. Indeed, it is
    undisputed here that the Notice of Appeal was never served on Da Silva.
    
    Id. at 449.
    In the present case, there is no dispute that the notice was served on defense counsel.
    Indeed, the State made it clear at the August 20 hearing that it would be filing an appeal as
    reflected in the court’s ruling; “and so that the record is clear – and I know that the State is
    asking to take an appeal, the record is clear.”      It is also clear now that, although the
    omission in the certificate of service is a defect, the certificate met the literal requirements
    of Rule 1-323—it provided the date and manner of service. Where there is no evidence
    that Andrews was prejudiced or that the course of the appeal was delayed by a defect, “it
    is the practice of this Court to decide appeals on the merits rather than on technicalities.”
    Bond v. Slavin, 
    157 Md. App. 340
    , 352-53 (2004). Cf. Williams v. Hofmann Balancing
    Techniques, Ltd., 
    139 Md. App. 339
    , 356-57 (2001) (holding that the appellant’s failure to
    identify one of the appellees on his notice of appeal did not deprive this Court of
    jurisdiction). To be sure, the Court of Appeals has observed that “[o]ur cases, and those of
    the Court of Special Appeals, have generally been quite liberal in construing timely orders
    for appeal.” Newman v. Reilly, 
    314 Md. 364
    , 386 (1988); see also 
    Lovero, 200 Md. App. at 450-51
    n.8 (and the cases cited therein) (recognizing that where a challenged notice of
    18
    appeal was timely filed the courts of Maryland construe the notice in favor of deciding the
    appeal on the merits). We deny Andrews’s motion to dismiss the appeal.
    Standard of Review
    We review the grant of a motion to suppress based on the record of the suppression
    hearing, and we view the facts in the light most favorable to the prevailing party. State v.
    Donaldson, 
    221 Md. App. 134
    , 138 (citing Holt v. State, 
    435 Md. 443
    , 457, 
    78 A.3d 415
    (2013)), cert. denied, 
    442 Md. 745
    (2015). Further, “we extend ‘great deference’ to the
    factual findings and credibility determinations of the circuit court, and review those
    findings only for clear error.” 
    Id. (citing Brown
    v. State, 
    397 Md. 89
    , 98 (2007)). But we
    make an independent, de novo, appraisal of whether a constitutional right has been violated
    by applying the law to facts presented in a particular case. Williams v. State, 
    372 Md. 386
    ,
    401 (2002) (citations omitted); see also 
    Brown, 397 Md. at 98
    (“[W]e review the court’s
    legal conclusions de novo and exercise our independent judgment as to whether an officer’s
    encounter with a criminal defendant was lawful.” (Citation omitted)).
    I.
    Fourth Amendment Search
    In 1966, in the wake of prominent Congressional hearings on government invasions
    of privacy, Justice Douglas, dissenting in Osborn v. United States and Lewis v. United
    States, and concurring in Hoffa v. United States, observed:
    We are rapidly entering the age of no privacy, where everyone is open
    to surveillance at all times; where there are no secrets from government. The
    aggressive breaches of privacy by the Government increase by geometric
    proportions. Wiretapping and ‘bugging’ run rampant, without effective
    judicial or legislative control.
    19
    ***
    Taken individually, each step may be of little consequence. But when viewed
    as a whole, there begins to emerge a society quite unlike any we have seen—
    a society in which government may intrude into the secret regions of man’s
    life at will.
    Osborn v. United States, 
    385 U.S. 323
    , 340-43 (1966) (Douglas, J., dissenting).7        Fifty
    years later we face the same concern—to what extent have advances in technology created
    an “age of no privacy.”8
    The Fourth Amendment to the United States Constitution, made applicable to the
    States by the Fourteenth Amendment, Mapp v. Ohio, 
    367 U.S. 643
    , 655 (1961), provides:
    The right of the people to be secure in their persons, houses, papers, and
    effects, against unreasonable searches and seizures, shall not be violated, and
    no Warrants shall issue, but upon probable cause, supported by Oath or
    affirmation, and particularly describing the place to be searched, and the
    persons or things to be seized.
    U.S. Const. amend. IV. The first clause protects individuals against unreasonable searches
    and seizures,9 see Katz v. United States, 
    389 U.S. 347
    , 359 (1967) (“Wherever a man may
    7
    The question presented in Osborn, as cast by Justice Douglas, was
    “whether the Government may compound the invasion of privacy by using hidden
    recording devices to record incriminating statements made by the unwary suspect to a
    secret federal agent.” 
    Osborn, 385 U.S. at 340
    .
    8
    See also City of Ontario, Cal. v. Quon, 
    560 U.S. 746
    , 760 (2010) (“Cell phone and
    text message communications are so pervasive that some persons may consider them to be
    essential means or necessary instruments for self-expression, even self-identification.”).
    9
    Although the parties do not present their arguments under the Maryland
    Constitution, Declaration of Rights, we note that Article 26—governing warrants for search
    and seizure—is generally construed to be co-extensive with the Fourth Amendment. See
    Upshur v. State, 
    208 Md. App. 383
    , 397 (2012) (citing Hamel v. State, 
    179 Md. App. 1
    , 18
    (2008)). Article 26 of the Maryland Declaration of Rights provides:
    20
    be, he is entitled to know that he will remain free from unreasonable searches and
    seizures[]”), and the second clause requires that warrants must be particular and supported
    by probable cause, see Payton v. New York, 
    445 U.S. 573
    , 584 (1980).
    A “search” within the meaning of the Fourth Amendment occurs where the
    government invades a matter in which a person has an expectation of privacy that society
    is willing to recognize as reasonable. Kyllo v. United States, 
    533 U.S. 27
    , 33 (2001) (citing
    
    Katz, 389 U.S. at 361
    (Harlan, J., concurring)). As we made clear in Raynor v. State, “[t]he
    burden of demonstrating a ‘legitimate’ or ‘reasonable’ expectation of privacy includes both
    a subjective and an objective component.” 
    201 Md. App. 209
    , 218 (2011), aff’d, 
    440 Md. 71
    (2014) (citation and footnote omitted). “[I]n order to claim the protection of the Fourth
    Amendment, a defendant must demonstrate that he personally has an expectation of privacy
    in the place searched, and that his expectation is reasonable; i.e., one that has ‘a source
    outside of the Fourth Amendment, either by reference to concepts of real or personal
    property law or to understandings that are recognized and permitted by society.’”
    Minnesota v. Carter, 
    525 U.S. 83
    , 88 (1998) (quoting Rakas v. Illinois, 
    439 U.S. 128
    , 143-
    44 n.12 (1978)).
    That all warrants, without oath or affirmation, to search suspected places, or
    to seize any person or property, are grievous and oppressive; and all general
    warrants to search suspected places, or to apprehend suspected persons,
    without naming or describing the place, or the person in special, are illegal,
    and ought not to be granted.
    21
    The Fourth Amendment protects not against all intrusions as such, “but against
    intrusions which are not justified in the circumstances, or which are made in an
    improper manner.” Maryland v. King, 
    133 S. Ct. 1958
    , 1969 (2013) (emphasis added)
    (quoting Schmerber v. California, 
    384 U.S. 757
    , 768 (1966)). “Although the underlying
    command of the Fourth Amendment is always that searches and seizures be reasonable,
    what is reasonable depends on the context within which a search takes place.” State v.
    Alexander, 
    124 Md. App. 258
    , 265 (1998) (emphasis added in Alexander) (quoting New
    Jersey v. T.L.O., 
    469 U.S. 325
    , 337 (1985)). Subject to a few well-delineated exceptions,
    “warrantless searches ‘are per se unreasonable under the Fourth Amendment.’” 
    Quon, 560 U.S. at 760
    (2010) (quoting 
    Katz, 389 U.S. at 357
    ); see also United States v. Karo, 
    468 U.S. 705
    , 717 (1984) (citations omitted).
    a. Effects of the Nondisclosure Agreement
    Before we examine the reasonableness of the State’s intrusion in context, we address
    the nondisclosure agreement entered into between the State’s Attorney for Baltimore City
    and the Federal Bureau of Investigation in early August 2011 as a condition of BPD’s
    purchase of certain “wireless collection equipment/technology manufactured by Harris
    [Corporation].” The nondisclosure agreement provided, in part:
    [T]o ensure that [] wireless collection equipment/technology continues to be
    available for use by the law enforcement community, the
    equipment/technology and any information related to its functions,
    operation, and use shall be protected from potential compromise by
    precluding disclosure of this information to the public in any manner
    including b[ut] not limited to: in press release, in court documents,
    during judicial hearings, or during other public forums or proceedings.
    Accordingly, the Baltimore City Police Department agrees to the following
    22
    conditions in connection with its purchase and use of the Harris Corporation
    equipment/technology:
    ***
    5. The Baltimore City Police Department and Office of the State’s Attorney
    for Baltimore City shall not, in any civil or criminal proceeding, use or
    provide any information concerning the Harris Corporation wireless
    collection equipment/technology, its associated software, operating
    manuals, and any related documentation (including its
    technical/engineering description(s) and capabilities) beyond the
    evidentiary results obtained through the use the equipment/technology
    including, but not limited to, during pre-trial matters, in search
    warrants and related affidavits, in discovery, in response to court
    ordered disclosure, in other affidavits, in grand jury hearings, in the
    State’s case-in-chief, rebuttal, or on appeal, or in testimony in any phase
    of civil or criminal trial, without the prior written approval of the FBI.
    ...
    (Emphasis added). The agreement directs that in the event of a Freedom of Information
    Act request, or a court order directing disclosure of information regarding Harris
    Corporation equipment or technology, the FBI must be notified immediately to allow them
    time to intervene “and potential[ly] compromise.” If necessary “the Office of the State’s
    Attorney for Baltimore will, at the request of the FBI, seek dismissal of the case in lieu of
    using or providing, or allowing others to provide, any information concerning the Harris
    Corporation wireless collection equipment/technology[.]”
    We observe that such an extensive prohibition on disclosure of information to the
    court—from special order and/or warrant application through appellate review—prevents
    the court from exercising its fundamental duties under the Constitution. To undertake the
    Fourth Amendment analysis and ascertain “the reasonableness in all the circumstances of
    the particular governmental invasion of a citizen’s personal security,” Terry v. Ohio, 392
    
    23 U.S. 1
    , 19 (1968), it is self-evident that the court must understand why and how the search
    is to be conducted. The reasonableness of a search or seizure depends “‘on a balance
    between the public interest and the individual’s right to personal security free from
    arbitrary interference by law officers.’” Pennsylvania v. Mimms, 
    434 U.S. 106
    , 109 (1977)
    (emphasis added) (quoting United States v. Brignoni-Ponce, 
    422 U.S. 873
    , 878 (1975)).
    The analytical framework requires analysis of the functionality of the surveillance device
    and the range of information potentially revealed by its use. A nondisclosure agreement
    that prevents law enforcement from providing details sufficient to assure the court that a
    novel method of conducting a search is a reasonable intrusion made in a proper manner
    and “justified by the circumstances,” obstructs the court’s ability to make the necessary
    constitutional appraisal. Cf. 
    King, 133 S. Ct. at 1970
    (“Even if a warrant is not required, a
    search is not beyond Fourth Amendment scrutiny; for it must be reasonable in its scope
    and manner of execution. Urgent government interests are not a license for indiscriminate
    police behavior.”). In West v. State, this Court stated that “to assure that the purpose of the
    Fourth Amendment is upheld, police officers must provide details within affidavits when
    attempting to acquire search warrants, even if such information would seem to the police
    officer of trivial consequence at the time.” 
    137 Md. App. 314
    , 331 (2001).
    As discussed further in Section III infra, it appears that as a consequence of the
    nondisclosure agreement, rather than apply for a warrant, prosecutors and police obtained
    an order under the Maryland pen register statute that failed to provide the necessary
    information upon which the court could make the constitutional assessments mandated in
    this case. The BPD certified to the court that pursuant to the order “the information likely
    24
    to be obtained concerning the aforesaid individual’s location will be obtained by learning
    the numbers, locations and subscribers of the telephone number(s) being dialed or pulsed
    from or to the aforesaid telephone . . . .”    However, the suppression court, having the
    benefit of Det. Haley’s testimony (reproduced above), learned that the BPD actually
    employed the Hailstorm device, which is capable of obtaining active real-time location
    information—far different from a pen register (a device or process that records and decodes
    dialing, routing, addressing, or signaling information transmitted by an instrument) or track
    and trace device (a device or process that captures the incoming electronic or other
    impulses that identify the originating number). See fn.2 supra.10
    We perceive the State’s actions in this case to protect the Hailstorm technology,
    driven by a nondisclosure agreement to which it bound itself, as detrimental to its position
    and inimical to the constitutional principles we revere.
    b. What Constitutes a “Search”—Level of Intrusion
    and Expectation of Privacy
    The State argues that the use of a cell site simulator does not constitute a “search”
    under the Fourth Amendment. The State maintains that the circuit court’s decision “was
    based upon both factually unreasonable conclusions about how the cell site simulator
    worked in this case, and legally incorrect determinations about what constitutes a ‘search.’”
    The State acknowledges that the factual bases for the circuit court’s rulings are found in
    the June 4, 2015 testimony of Det. Haley. However, the State argues that Det. Haley’s
    10
    It is not clear from the record whether Det. Haley’s testimony was authorized
    through written approval from the FBI as required in paragraph 5 of the nondisclosure
    agreement.
    25
    testimony “was necessarily rather summary,” and does not support the factual conclusions
    of the circuit court.
    According to the State, the cell site simulator “acts like a cell tower, and waits to
    receive a signal bearing the target IMSI” [International Mobil Subscriber Identity].       The
    State maintains that, properly construed, Det. Haley’s testimony reveals that “the process
    of a cell phone sending its identifying information to a cell tower was indistinguishable
    from the process of a cell phone sending its identifying information to a cell site simulator.”
    The State asserts that the Hailstorm device “merely reads the ID number regularly
    transmitted by activated cell phones as part of their ordinary use” and “[w]hen the device
    detects a signal from the target phone, it notifies the operator the direction of the signal and
    the relative strength, allowing the operator to estimate the probable location of the phone.”
    Therefore, the State argues that no reasonable expectation of privacy existed in the
    information obtained by the Hailstorm device and no intrusion or “search” occurred.
    Andrews countercharges that there was ample, explicit support in the record for the
    circuit court’s finding that the Hailstorm device operated by emitting a signal “through the
    wall of a house” and “into the phone” triggering the phone to respond to the device.
    Andrews argues that, through the use of an “active cellular surveillance device,” the State
    violated his reasonable expectation of privacy in the personal information contained and
    generated by his cell phone, without which the government would not have been able to
    discover his location inside the home.
    Presumably because of the nondisclosure agreement discussed above, the State
    provided limited information regarding the function and use of the Hailstorm device. And
    26
    presumably, the State would have limited itself in this manner regardless of whether it
    relied on testimony from the prior hearing or produced live testimony before the
    suppression court.11 Notwithstanding this, it is clear from Det. Haley’s testimony that “the
    Hailstorm equipment acts like a cell tower,” but, unlike a cell tower awaiting incoming
    signals, the Hailstorm is an active device that can send an electronic signal through the wall
    of a house and “draw[] the phone to [the] equipment.” Based on the direction and strength
    of the signal the Hailstorm receives from a cell phone in response, law enforcement can
    pinpoint the real-time location of a cell phone (and likely the person to whom it belongs)
    within less than 20 yards.
    These points from Det. Haley’s testimony regarding the function of the Hailstorm
    device are consistent with what other courts and legal scholars have been able to discern
    about the device.    Hailstorm, along with the earlier-model cell site simulator known as
    “StingRay,” to which Det. Haley referred, are far from discrete, limited surveillance tools.
    Rather, as described in a recent article in the Harvard Journal of Law and Technology cited
    by Appellee and the amici:12
    This technology, commonly called the StingRay, the most well-known brand
    name of a family of surveillance devices known more generically as “IMSI
    11
    In a suppression hearing, “[w]here . . . the defendant establishes initially that the
    police proceeded warrantlessly, the burden shifts to the State to establish that strong
    justification existed for proceeding under one of the ‘jealously and carefully drawn’
    exceptions to the warrant requirement.” Jones v. State, 
    139 Md. App. 212
    , 226 (2001)
    (citation omitted). Where the evidence presented is inconclusive, the consequence for the
    State is that the defendant wins. 
    Id. 12 In
    addition to the ACLU and EFF, Professor David Gray of the University of
    Maryland Francis King Carey School of Law filed a detailed and informative amicus brief
    in this case.
    27
    catchers,” is used by law enforcement agencies to obtain, directly and in real
    time, unique device identifiers and detailed location information of cellular
    phones—data that it would otherwise be unable to obtain without the
    assistance of a wireless carrier.
    ***
    By impersonating a cellular network base station, a StingRay—a surveillance
    device that can be carried by hand, installed in a vehicle, or even mounted on
    a drone—tricks all nearby phones and other mobile devices into
    identifying themselves (by revealing their unique serial numbers) just as
    they would register with genuine base stations in the immediate vicinity. As
    each phone in the area identifies itself, the StingRay can determine the
    location from which the signal came.
    Stephanie K. Pell & Christopher Soghoian, A Lot More Than A Pen Register, and Less
    Than A Wiretap: What the Stingray Teaches Us About How Congress Should Approach
    the Reform of Law Enforcement Surveillance Authorities, 16 Yale J. L. & Tech. 134, 142,
    145-46 (2014) (emphasis added; footnotes omitted).
    The Supreme Court of Wisconsin examined whether law enforcement could obtain
    location data through cell site information or a StingRay pursuant to a warrant and, before
    holding that the warrant was sufficiently particularized, based on probable cause, and
    passed constitutional muster, observed:
    A stingray is an electronic device that mimics the signal from a cellphone
    tower, which causes the cell phone to send a responding signal. If the
    stingray is within the cell phone’s signal range, the stingray measures signals
    from the phone, and based on the cell phone’s signal strength, the stingray
    can provide an initial general location of the phone. By collecting the cell
    phone’s signals from several locations, the stingray can develop the location
    of the phone quite precisely.
    State v. Tate, 
    849 N.W.2d 798
    , 826 n.8 (Wisc. 2014) (citation omitted), cert. denied, 
    135 S. Ct. 1166
    (2015); see also, e.g., In re Application for Pen Register and Trap/Trace Device
    28
    with Cell Site Location Authority, 
    396 F. Supp. 2d 747
    , 755 (S.D. Tex. 2005) (defining an
    earlier-model device, the “Triggerfish,” as equipment that “enables law enforcement to
    gather cell site location information directly, without the assistance of the service
    provider”). We cannot say that the factual findings of the circuit court, in this case, were
    erroneous; they are firmly grounded in the testimony before that court, and the State has
    provided no evidence to the contrary.
    In determining then whether a Fourth Amendment “search” occurred, we apply the
    court’s factual findings to the test pronounced in 
    Katz, supra
    . Rather than limit the
    constitutional appraisal to a trespass analysis,13 the Katz test requires a two-fold showing:
    “first that a person have exhibited an actual (subjective) expectation of privacy and, second,
    that the expectation be one that society is prepared to recognize as 
    ‘reasonable.’” 389 U.S. at 361
    (Harlan, J., concurring).14 Even under the more flexible Katz test, however, rapid
    13
    In Olmstead v. United States, the Supreme Court held that the government’s use
    of a wire-tapping device over an extended period of time did not constitute a violation of
    the Fourth Amendment because the wires were installed in a manner that did not constitute
    a trespass upon the property of the petitioners. 
    277 U.S. 438
    , 464 (1928). Thus, the Court
    stated that a Fourth Amendment violation would occur where there was a tangible, physical
    intrusion by the government. Cf. 
    id. at 466.
    Olmstead was overruled in part by the Court
    in 
    Katz. 389 U.S. at 353
    .
    14
    Maryland appellate courts have, so far, only addressed the admissibility of
    historical CSLI obtained from a service provider. See State v. Payne, 
    440 Md. 680
    , 690-
    91 (2014) (stating that whether a detective “should have been qualified as an expert before
    being allowed to engage in the process of identifying the geographic location of the cell
    towers and the locations themselves depends on understanding just what are cell phone
    records and what their contents reveal.”); Hall v. State, 
    225 Md. App. 72
    , 91 (2015)
    (concluding that the State’s witness was properly qualified as an expert to testify regarding
    the mapping of appellant’s cell phone data); Stevenson v. State, 
    222 Md. App. 118
    , 129-30
    (determining that a Frye-Reed hearing on admissibility of novel scientific evidence and
    expert scientific testimony was not required for admission of cellular tower “ping”
    29
    advancements in technology make ascertaining what constitutes a search under the Fourth
    Amendment ever more challenging.15
    Charles Katz was charged with transmitting wagering information by telephone in
    violation of federal law. 
    Katz, 389 U.S. at 348
    . He objected during his trial to the
    evidence), cert. denied, 
    443 Md. 737
    (2015); Wilder v. State, 
    191 Md. App. 319
    , 364 (2010)
    (holding that the admission of CSLI required the qualification of the sponsoring witness as
    an expert); Coleman-Fuller v. State, 
    192 Md. App. 577
    , 619 (2010) (same). Maryland
    courts have not previously addressed CSLI in the context of a Fourth Amendment
    challenge and have never addressed police use of cell site simulators or obtaining real-time
    CSLI. Because key factual distinctions in this case involve the function of Hailstorm and
    the ability of law enforcement to track a cell phone directly and in real time, our own cases
    provide limited guidance.
    15
    See generally Renée McDonald Hutchins, Tied Up In Knotts? GPS Technology
    and The Fourth Amendment, 55 UCLA L. Rev. 409 (2007). Professor Hutchins notes that
    the Supreme Court has developed a differential treatment in its intrusiveness analysis under
    the Fourth Amendment based on the type of information revealed, explaining:
    When gauging the objective reasonableness of various privacy
    expectations, the Court has leaned heavily on its assessment of the type of
    information revealed to segregate challenged surveillance technologies into
    two rough groups: sense-augmenting surveillance and extrasensory
    surveillance. Sense augmenting surveillance refers to surveillance that
    reveals information that could theoretically be attained through one of the
    five human senses. With regard to this type of surveillance, the Court has
    tended to find that simple mechanical substitutes for or enhancements of
    human perception typically trigger no Fourth Amendment concerns in cases
    in which human perception alone would not have required a warrant.
    Extrasensory surveillance, conversely, is that which reveals
    information otherwise indiscernible to the unaided human senses. The Court
    has adopted a more privacy-protective view of this form of technologically
    enhanced police conduct. In fact, the case law suggests that surveillance of
    this type is largely prohibited in the absence of a warrant.
    
    Id. at 432-33.
    30
    government’s introduction of evidence collected by FBI agents who overheard and
    recorded his end of telephone conversations from inside a public telephone booth. 
    Id. The agents
    had placed a recording device on the outside of the phone booth from which Katz
    placed his calls. 
    Id. The government
    contended on appeal that their surveillance did not
    constitute a search prohibited by the Fourth Amendment because Katz was in a public
    location that was not constitutionally protected and because the technique they employed
    involved no physical penetration of the telephone booth. 
    Id. at 352.
    Writing for the
    majority, Justice Stewart rejected the formulation of the issues by the parties, premised on
    whether the telephone booth was a “constitutionally protected area,” and instructed that
    “[t]he Fourth Amendment protects people, not places . . . what [Katz] seeks to preserve as
    private, even in an area accessible to the public, may be constitutionally protected.” 
    Id. at 361
    (citations omitted). The Court continued, stating that “once it is recognized that the
    Fourth Amendment protects people—and not simply ‘areas’—against unreasonable
    searches and seizures it becomes clear that the reach of that Amendment cannot turn upon
    the presence or absence of a physical intrusion into any given enclosure.” 
    Id. at 350,
    353.
    Almost 20 years after establishing in Katz that an examination of intrusiveness
    under the Fourth Amendment is not simply measured by physical invasion, the Supreme
    Court addressed the constitutionality of the government’s surreptitious use of a radio
    transmitter to track the movements of a container to and inside a private residence. United
    States v. 
    Karo, supra
    , 468 U.S. at 709-10. The physical installation of the transmitter was
    not at issue; rather, the question before the Court was “whether the monitoring of a beeper
    in a private residence, not open to visual surveillance, violates the Fourth Amendment
    31
    rights of those who have a justifiable interest in the privacy of the residence.” 
    Id. at 714.
    Although the Court noted that the monitoring of an electronic device is “less intrusive than
    a full-scale search,” it, nevertheless, reveals information about the interior of the residence
    that the government “could not have otherwise obtained without a warrant.” 
    Id. at 715.
    The Supreme Court stated:
    We cannot accept the Government’s contention that it should be completely
    free from the constraints of the Fourth Amendment to determine by means
    of an electronic device, without warrant and without probable cause or
    reasonable suspicion, whether a particular article—or a person, for that
    matter—is in an individual’s home at a particular time. Indiscriminate
    monitoring of property that has been withdrawn from public view would
    present far too serious a threat to privacy interests in the home to escape
    entirely some sort of Fourth Amendment oversight.
    
    Id. at 716
    (footnote omitted). Notably, the Court also soundly rejected the government’s
    contention that it should be able to engage in warrantless monitoring of an electronic device
    inside a private residence “if there is the requisite justification in the facts for believing that
    a crime is being or will be committed and that monitoring the beeper wherever it goes is
    likely to produce evidence of criminal activity.” 
    Id. at 717
    (emphasis added). The Court
    recognized limited exceptions to the general rule, such as in the case of exigency, but
    explained why in its view the government exaggerated the difficulties associated with
    obtaining a warrant:
    The Government argues that the traditional justifications for the warrant
    requirement are inapplicable in beeper cases, but to a large extent that
    argument is based upon the contention, rejected above, that the beeper
    constitutes only a minuscule intrusion on protected privacy interests. The
    primary reason for the warrant requirement is to interpose a ‘neutral and
    detached magistrate’ between the citizen and ‘officer engaged in the often
    competitive enterprise of ferreting out crime.’
    32
    ***
    The Government contends that it would be impossible to describe the ‘place’
    to be searched, because the location of the place is precisely what is sought
    to be discovered through the search. [ ] However true that may be, it will still
    be possible to describe the object into which the beeper is to be placed, the
    circumstances that led agents to wish to install the beeper, and the length of
    time for which beeper surveillance is requested.
    
    Id. at 717
    -18 (citing Johnson v. United States, 
    333 U.S. 10
    , 14 (1948)).
    In 
    Kyllo, supra
    , the Supreme Court considered whether a Fourth Amendment search
    had occurred when the government used a thermal imaging device to detect infrared
    radiation inside a 
    home. 533 U.S. at 29-30
    . Federal agents, suspecting that Danny Kyllo
    was growing marijuana inside his home, were able to confirm areas of heat coming from
    high intensity lamps used to grow marijuana plants indoors. 
    Id. At the
    threshold of his
    analysis, Justice Scalia, writing for the majority, observed:
    It would be foolish to contend that the degree of privacy secured to
    citizens by the Fourth Amendment has been entirely unaffected by the
    advance of technology. . . . The question we confront today is what limits
    there are upon this power of technology to shrink the realm of guaranteed
    privacy.
    
    Id. at 33-34.
    The Court then noted that, although the Katz test—“whether the individual
    has an expectation of privacy that society is prepared to recognize as reasonable”—may be
    difficult to apply to some locations, such as telephone booths and automobiles—the
    expectation of privacy in the home had “roots deep in the common law.” 
    Id. at 34.
    In support of the use of its thermal imaging technology, the government in Kyllo
    argued that there was no “search” because the device detected “‘only heat radiating from
    the external surface of the house[.]’” 
    Id. at 35.
    The Supreme Court, however, cast aside
    33
    this contention as the kind of mechanical interpretation rejected in Katz and stated, “so also
    a powerful directional microphone picks up only sound emanating from a house—and a
    satellite capable of scanning from many miles away would pick up only visible light
    emanating from a house.” 
    Id. Rather than
    abandon Katz and take such a mechanical
    approach, the Court sought to adopt a rule “tak[ing] account of more sophisticated
    [surveillance] systems that are already in use or in development.” 
    Id. at 35-36
    (footnote
    omitted). Accordingly, the Court held that “[w]here . . . the Government uses a device that
    is not in general public use, to explore the details of the home that would previously have
    been unknowable without physical intrusion, the surveillance is a ‘search’ and is
    presumptively unreasonable without a warrant.” 
    Id. at 40.
    Furthermore, the Court repeated
    the caveat of Silverman v. United States, that the “protection of the home has never been
    tied to the measurement of the quality or quantity of information obtained” for any invasion
    of the home, “‘by even a fraction of an inch’ [is] too much.” 
    Id. at 37
    (quoting Silverman,
    
    365 U.S. 505
    , 512 (1961)).
    From Katz to Kyllo, the Supreme Court has firmly held that use of surveillance
    technology not in general public use to obtain information about the interior of a home, not
    otherwise available without trespass, is a “search” under the Fourth Amendment. These
    decisions resolved to protect an “expectation of privacy that society is prepared to
    recognize as reasonable.” After Kyllo, however, the question remained whether electronic
    tracking or surveillance outside the home could constitute a search under the Fourth
    Amendment.
    34
    In United States v. Jones, the Supreme Court reviewed the use of a GPS tracking
    device affixed to the undercarriage of a vehicle to track the movements of the defendant
    over a period of 28 days. 
    132 S. Ct. 945
    , 948 (2012). The Court unanimously affirmed
    the United States Court of Appeals for the District of Columbia Circuit’s holding that the
    electronic location surveillance over a period of 28 days was a search and that admission
    of evidence obtained by the warrantless use of the GPS device violated the Fourth
    Amendment. The Court was unable, however, to reach full agreement as to the basis for
    its decision. See 
    id. at 953
    (majority opinion); 954 (Sotomayor, J., concurring); 967 (Alito,
    J., concurring in the judgment). Justice Scalia’s majority opinion found that a search
    occurred under the traditional, pre-Katz “trespass” rationale, but acknowledged that
    “[s]ituations involving merely the transmission of electronic signals without trespass would
    remain subject to Katz analysis.” 
    Id. at 953
    (emphasis in original).
    Agreeing with Justice Brennan’s concurrence in Knotts v. United States, Justice
    Scalia expounded that “‘when the Government does engage in physical intrusion of a
    constitutionally protected area in order to obtain information, that intrusion may constitute
    a violation of the Fourth Amendment.’” 
    Id. at 951
    (quoting Knotts, 
    460 U.S. 276
    , 286
    (1983)).   When law enforcement placed the GPS tracking system on Jones’s vehicle,
    without a warrant, the government physically invaded a constitutionally protected area, 
    id. at 949,
    952, and factors beyond trespass need not be considered to find there was a Fourth
    Amendment violation. 
    Id. at 953
    -54. Justice Scalia explained that the common-law
    trespass test was essentially a minimum test and that the Katz test was “added to, not
    substituted for, the common-law trespassory test.” 
    Id. at 952.
    35
    Justice Sotomayor revisited the Katz analysis in her concurring opinion, stating that,
    “even in the absence of a trespass, ‘a Fourth Amendment search occurs when the
    government violates a subjective expectation of privacy that society recognizes as
    reasonable.’” 
    Id. at 954-55
    (Sotomayor, J., concurring) (citations omitted). Recognizing
    that “[i]n cases of electronic or other novel modes of surveillance that do not depend upon
    a physical invasion on property, the majority opinion’s trespassory test may provide little
    guidance[,]” Justice Sotomayor opined that the unique attributes of GPS location
    surveillance will require careful application of the Katz analysis. 
    Id. She urged
    the Court
    to update its understanding of peoples’ expectations of privacy in the information age:
    GPS monitoring generates a precise, comprehensive record of a person’s
    public movements that reflects a wealth of detail about her familial, political,
    professional, religious, and sexual associations. See, e.g., People v. Weaver,
    
    12 N.Y.3d 433
    , 441–442, 
    882 N.Y.S.2d 357
    , 
    909 N.E.2d 1195
    , 1199 (2009)
    (“Disclosed in [GPS] data . . . will be trips the indisputably private nature of
    which takes little imagination to conjure: trips to the psychiatrist, the plastic
    surgeon, the abortion clinic, the AIDS treatment center, the strip club, the
    criminal defense attorney, the by-the-hour motel, the union meeting, the
    mosque, synagogue or church, the gay bar and on and on”). The Government
    can store such records and efficiently mine them for information years into
    the future. [United States v.] Pineda–Moreno, 617 F.3d[ 1120,] 1124 [(9th
    Cir. 2010)] (opinion of Kozinski, C.J.). And because GPS monitoring is
    cheap in comparison to conventional surveillance techniques and, by design,
    proceeds surreptitiously, it evades the ordinary checks that constrain abusive
    law enforcement practices: “limited police resources and community
    hostility.” Illinois v. Lidster, 
    540 U.S. 419
    , 426, 
    124 S. Ct. 885
    , 
    157 L. Ed. 2d 843
    (2004).
    Awareness that the Government may be watching chills associational
    and expressive freedoms. And the Government’s unrestrained power to
    assemble data that reveal private aspects of identity is susceptible to abuse.
    The net result is that GPS monitoring—by making available at a relatively
    low cost such a substantial quantum of intimate information about any person
    whom the Government, in its unfettered discretion, chooses to track—may
    “alter the relationship between citizen and government in a way that is
    36
    inimical to democratic society.” United States v. Cuevas–Perez, 
    640 F.3d 272
    , 285 (C.A.7 2011) (Flaum, J., concurring).
    I would take these attributes of GPS monitoring into account when
    considering the existence of a reasonable societal expectation of privacy in
    the sum of one’s public movements. I would ask whether people reasonably
    expect that their movements will be recorded and aggregated in a manner
    that enables the Government to ascertain, more or less at will, their political
    and religious beliefs, sexual habits, and so on. I do not regard as dispositive
    the fact that the Government might obtain the fruits of GPS monitoring
    through lawful conventional surveillance techniques. See 
    Kyllo, 533 U.S., at 35
    , n.2, 
    121 S. Ct. 2038
    ; ante, at 954 (leaving open the possibility that
    duplicating traditional surveillance “through electronic means, without an
    accompanying trespass, is an unconstitutional invasion of privacy”). I would
    also consider the appropriateness of entrusting to the Executive, in the
    absence of any oversight from a coordinate branch, a tool so amenable to
    misuse, especially in light of the Fourth Amendment’s goal to curb arbitrary
    exercises of police power to and prevent “a too permeating police
    surveillance,” United States v. Di Re, 
    332 U.S. 581
    , 595, 
    68 S. Ct. 222
    , 
    92 L. Ed. 210
    (1948).
    
    Jones, 132 S. Ct. at 955-56
    (Sotomayor, J., concurring) (footnote omitted).
    Justice Alito, concurring only in the judgment, disagreed with the majority’s
    reliance on a trespassory theory. 
    Jones, 132 S. Ct. at 958
    . Instead, Justice Alito found the
    appropriate inquiry to be “whether respondent’s reasonable expectations of privacy were
    violated by the long-term monitoring of the movements of the vehicle he drove.” 
    Id. Justice Alito
    stated that the majority’s reasoning “disregard[ed] what is really important
    (the use of a GPS for the purpose of long-term tracking)” and “will present particularly
    vexing problems in cases involving surveillance that is carried out by making electronic,
    as opposed to physical, contact with the item to be tracked.” 
    Id. at 962
    (emphasis in
    original).
    37
    From the above precedent, we glean two broad principles regarding the Fourth
    Amendment analysis of surveillance technology. First, where surveillance technology is
    used without a warrant to obtain information about the contents of a home, not otherwise
    discernable without physical intrusion, there has been an unlawful search. See 
    Kyllo, 533 U.S. at 34-35
    . Second, where the government has engaged in surveillance using “electronic
    signals without trespass[,]” the intrusion will “remain subject to Katz analysis.” 
    Jones, 132 S. Ct. at 953
    (emphasis in original). The Supreme Court has recognized, however, that cell
    phones present novel privacy concerns.
    In 
    Riley, supra
    , the Supreme Court made clear that a search of the information
    contained in a cell phone is subject to the warrant requirement regardless of its 
    location. 134 S. Ct. at 2489-91
    . The Court held that even during a search incident to arrest, the
    government must first obtain a warrant before searching the digital contents of a cell phone
    found on the person being arrested. 
    Id. at 2485-86.
    Chief Justice Roberts described the modern cell phone as much more than a phone:
    Cell phones differ in both a quantitative and a qualitative sense from
    other objects that might be kept on an arrestee’s person. The term “cell
    phone” is itself misleading shorthand; many of these devices are in fact
    minicomputers that also happen to have the capacity to be used as a
    telephone. They could just as easily be called cameras, video players,
    rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions,
    maps, or newspapers.
    One of the most notable distinguishing features of modern cell phones
    is their immense storage capacity. Before cell phones, a search of a person
    was limited by physical realities and tended as a general matter to constitute
    only a narrow intrusion on privacy. Most people cannot lug around every
    piece of mail they have received for the past several months, every picture
    they have taken, or every book or article they have read—nor would they
    have any reason to attempt to do so. And if they did, they would have to drag
    38
    behind them a trunk of the sort held to require a search warrant in 
    Chadwick, supra
    , rather than a container the size of the cigarette package in Robinson.
    
    Id. at 2489.
    The State argues that its use of the Hailstorm here should be analogized to Knotts,
    
    460 U.S. 276
    , wherein the Supreme Court upheld law enforcement officers’ use of a radio
    transmitter to track the movements of a container, by automobile, to a defendant’s home.
    In Knotts, the Court noted that “[t]he governmental surveillance conducted by means of
    the beeper in this case amounted principally to the following of an automobile on public
    streets and highways.” 
    Id. at 281.
    The Court concluded that:
    A person travelling in an automobile on public thoroughfares has no
    reasonable expectation of privacy in his movements from one place to
    another. When [the defendant] travelled over the public streets he voluntarily
    conveyed to anyone who wanted to look the fact that he was travelling over
    particular roads in a particular direction, the fact of whatever stops he made,
    and the fact of his final destination when he exited from public roads onto
    private property.
    
    Id. at 281-82.
    Here, the State argues that because Andrews’s cell phone was “constantly
    emitting ‘pings’ giving its location to the nearest cell tower, . . . there can be no reasonable
    expectation of privacy in [that] information” under Knotts.
    The State’s reliance on Knotts, however, is misplaced. In Karo, the Supreme Court
    clarified that in Knotts the electronic device “told the authorities nothing about the interior
    of Knotts’ 
    cabin.” 468 U.S. at 715
    . Rather, the information obtained in Knotts was
    “voluntarily conveyed to anyone who wanted to look[,]” 
    id. (quoting Knotts,
    460 U.S. at
    281), and the subsequent search warrant was also supported by “intermittent visual
    surveillance” of the cabin, 
    Knotts, 460 U.S. at 279
    . As noted in Kyllo, the Supreme Court
    39
    has long recognized that “[v]isual surveillance [i]s unquestionably lawful because ‘the eye
    cannot by the laws of England be guilty of a 
    trespass.’” 533 U.S. at 31-32
    (quoting Boyd
    v. United States, 
    116 U.S. 616
    , 628 (1886)).
    Here, there was no visual surveillance. The mere fact that police could have located
    Andrews within the residence by following him as he travelled over public thoroughfares
    does not change the fact that the police did not know where he was, so they could not
    follow him. Unlike Knotts, the information obtained in this case did reveal at least one
    critical detail about the residence; i.e., that its contents included Andrews’s cell phone, and
    therefore, most likely Andrews himself. Further, “pings” from Andrews’s cell phone to
    the nearest tower were not available “to anyone who wanted to look.” We find the
    surreptitious conversion of a cell phone into a tracking device and the electronic
    interception of location data from that cell phone markedly distinct from the combined use
    of visual surveillance and a “beeper to signal the presence of [the defendant’s] automobile
    to the police receiver” to track a vehicle over public roads. See 
    Knotts, 460 U.S. at 282
    .
    Put simply, the information obtained by police in this case was not readily available and in
    the public view as it was in Knotts.
    Cell site simulators, such as Hailstorm, can locate and track the movements of a cell
    phone and its user across both public and private spaces. Unchecked, the use of this
    technology would allow the government to discover the private and personal habits of any
    user. As Justice Sotomayor predicted in her concurring opinion in 
    Jones, supra
    , we are
    compelled to ask “whether people reasonably expect that their movements will be recorded
    and aggregated in a manner that enables the Government to ascertain, more or less at will,
    40
    their political and religious beliefs, sexual habits, and so 
    on.” 132 S. Ct. at 956
    (Sotomayor,
    J., concurring). We conclude that they do not.
    We agree with the United States Court of Appeals for the Fourth Circuit in United
    States v. Graham, in declaring, “[w]e cannot accept the proposition that cell phone users
    volunteer to convey their location information simply by choosing to activate and use their
    cell phones and to carry the devices on their person.” 
    796 F.3d 332
    , 355 (4th Cir.), reh’g
    en banc granted, 624 F. App’x 75 (4th Cir. 2015).16 Federal courts reviewing pen
    register\trap & trace applications have similarly recognized a reasonable expectation of
    privacy in cell site location information. See, e.g., In re the Application of the United States
    for an Order Authorizing (1) Installation and Use of a Pen Register and Trap and Trace
    Device or Process, (2) Access to Customer Records, and (3) Cell Phone Tracking, 441 F.
    Supp. 2d 816, 837 (S.D. Tex. 2006) (“[D]etailed location information, such as triangulation
    and GPS data, … unquestionably implicate Fourth Amendment privacy rights.”); In re
    16
    The recent cell phone encryption battle between Apple and the United States
    Government illustrates how fervently people care about protecting their personal location
    information. In 2011, consumers learned that their iPhones stored months of data regarding
    Wi-Fi hotspots and cell towers around their location in a format that was not encrypted.
    The ensuing barrage of complaints caused Apple to revise its operating system to protect
    consumers’ location information. Apple, Inc. Press Release, Apple Q&A on Location Data
    (April 27, 2011) (available at https://www.apple.com/pr/library/2011/04/27Apple-Q-A-
    on-Location-Data.html) [https://perma.cc/PJ5V-KHGE]. Apple refused to comply with a
    court order to create software to disable certain security protections of an iPhone. See
    Testimony of Bruce Sewell, Encryption Tightrope: Balancing American’s Security and
    Privacy, Hearing before the House Comm. on the Judiciary, 114th Cong. (March 1, 2016);
    Timothy B. Lee, Apple's Battle with the FBI over iPhone Security, Explained, Vox (Feb.
    17,       2016),       http://www.vox.com/2016/2/17/11037748/fbi-apple-san-bernardino
    [http://perma.cc/4MFA-JZ4D].
    41
    Application of the United States for an Order Authorizing Installation and Use of a Pen
    Register and a Caller Identification System on Telephone Numbers (Sealed), 
    402 F. Supp. 2d
    597, 604–05 (D. Md. 2005) (recognizing that monitoring of cell phone location
    information is likely to violate a reasonable expectation of privacy)).    We also accept the
    circuit court’s finding in this case that “no one expects that their phone information is being
    sent directly to the police department on their apparatus.”17 Recognizing that the Fourth
    Amendment protects people and not simply areas, 
    Katz, 389 U.S. at 353
    , we conclude that
    people have a reasonable expectation of privacy in real-time cell phone location
    information.
    Moreover, because the use of the cell site simulator in this case revealed the location
    of the phone and Andrews inside a residence, we are presented with the additional concern
    that an electronic device not in general public use has been used to obtain information about
    the contents of a home, not otherwise discernable without physical intrusion. See 
    Kyllo, 533 U.S. at 34-35
    . Under the applicable precedent, this is undoubtedly an intrusion that
    rises to the level of a Fourth Amendment “search.”            See 
    id. Indeed, “the
    Fourth
    Amendment draws a firm line at the entrance to the house[.]” 
    Id. at 40
    (citation and internal
    quotation marks omitted). Although we recognize that the use of a cell site simulator to
    track a phone will not always result in locating the phone within a residence, we agree with
    the Fourth Circuit’s observation that “the government cannot know in advance of obtaining
    17
    As the Supreme Court stated in Katz, “[t]o read the Constitution more narrowly
    is to ignore the vital role that the … telephone has come to play in private 
    communication.” 389 U.S. at 352
    .
    42
    this information how revealing it will be or whether it will detail the cell phone user’s
    movements in private spaces.” 
    Graham, 796 F.3d at 350
    (citation omitted). The United
    States District Court for the District of Maryland articulated the same concern when
    addressing the government’s use of a particular cell phone as a tracking device to aid in
    execution of an arrest warrant. The district court stated:
    Location data from a cell phone is distinguishable from traditional physical
    surveillance because it enables law enforcement to locate a person entirely
    divorced from all visual observation. Indeed, this is ostensibly the very
    characteristic that makes obtaining location data a desirable method of
    locating the subject of an arrest warrant. This also means, however, that
    there is no way to know before receipt of location data whether the
    phone is physically located in a constitutionally-protected place. In
    other words, it is impossible for law enforcement agents to determine
    prior to obtaining real-time location data whether doing so infringes
    upon the subject’s reasonable expectation of privacy and therefore
    constitutes a Fourth Amendment search.
    In re Application of United States for an Order Authorizing Disclosure of Location Info. of
    a Specified Wireless Tel., 
    849 F. Supp. 2d 526
    , 540 (D. Md. 2011) (emphasis added).
    It would be impractical to fashion a rule prohibiting a warrantless search only
    retrospectively based on the fact that the search resulted in locating the cell phone inside a
    home or some other constitutionally protected area. See, e.g., 
    Kyllo, 533 U.S. at 38-39
    (declining to adopt a Fourth Amendment standard that would only bar the use of thermal
    imaging to discern “intimate details” in the home because “no police officer would be able
    to know in advance whether his through-the-wall surveillance picks up ‘intimate’ details—
    and thus would be unable to know in advance whether it is constitutional.” (emphasis in
    original)); cf. 
    Karo, 468 U.S. at 718
    (“We are also unpersuaded by the argument that a
    warrant should not be required because of the difficulty in satisfying the particularity
    43
    requirement of the Fourth Amendment.”). Such a rule would provide neither guidance nor
    deterrence, and would do nothing to thwart unconstitutional intrusions. Cf. In re the
    Application of the United States for an Order (1) Authorizing the Use of a Pen Register
    and a Trap and Trace Device, 
    396 F. Supp. 2d 294
    , 323 (E.D.N.Y.2005) (“Because the
    government cannot demonstrate that cell site tracking could never under any circumstance
    implicate Fourth Amendment privacy rights, there is no reason to treat cell phone tracking
    differently from other forms of tracking . . . which routinely require probable cause.”
    (Internal quotations and citations omitted)).
    We determine that cell phone users have an objectively reasonable expectation that
    their cell phones will not be used as real-time tracking devices through the direct and active
    interference of law enforcement. We hold, therefore, that the use of a cell site simulator,
    such as Hailstorm, by the government, requires a search warrant based on probable cause
    and describing with particularity the object and manner of the search, unless an established
    exception to the warrant requirement applies.
    We turn to consider whether such an exception applies in this case.
    c. The Third Party Doctrine
    The State maintains that the “Third Party Doctrine” exception to the warrant
    requirement applied to the BPD’s use of Hailstorm to track down Andrews’s cell phone.
    The doctrine—providing that an individual forfeits his or her expectation of privacy in
    information that is turned over to a third party—finds its strongest expression in United
    States v. Miller, 
    425 U.S. 435
    (1976) and Smith v. Maryland, 
    442 U.S. 735
    (1979).
    44
    In Smith v. Maryland, the Supreme Court was presented with the issues of whether
    the warrantless installation and use of a pen register to collect the telephone numbers dialed
    from a telephone at the petitioner’s home constituted a “search” within the meaning of the
    Fourth 
    Amendment. 442 U.S. at 736-37
    . The Court described the function of pen registers,
    stating that they “‘disclose only the telephone numbers that have been dialed—a means of
    establishing communication. Neither the purpose of any communication between the caller
    and the recipient of the call, their identities, nor whether the call was even completed is
    disclosed by pen registers.’” 
    Id. at 741
    (quoting United States v. New York Tel. Co., 
    434 U.S. 159
    , 167 (1977)). Accordingly, the Court narrowed the issue before it, stating:
    Given a pen register’s limited capabilities, therefore, petitioner’s argument
    that its installation and use constituted a “search” necessarily rests upon a
    claim that he had a “legitimate expectation of privacy” regarding the numbers
    he dialed on his phone.
    
    Id. at 742.
      In United States v. Miller, the Supreme Court held that no reasonable
    expectation of privacy existed once the owner of financial checks turned financial
    instruments over to a bank and “exposed [them] to [bank] employees in the ordinary course
    of 
    business.” 425 U.S. at 442
    .
    The State argues that the cell site simulator used in this case merely “detects the
    signal emitted by the cell phone, just as a regular cell tower would[,]” and, therefore, “the
    police used data that Andrews voluntarily shared with third parties—specifically his cell
    phone provider—to locate his phone.” The State maintains that, under Smith no Fourth
    Amendment “search” occurred because Andrews had no reasonable expectation of privacy
    in information he voluntarily transmitted to a third party. The State contends that, by
    45
    carrying and using a cell phone that regularly communicates with nearby cell towers,
    Andrews assumed the risk that the information transmitted to the cell towers would be
    revealed to the police.
    According to Andrews, the third-party doctrine of Smith v. Maryland, is
    inapplicable because “a cell phone user takes no conscious, voluntary action to constantly
    share location information with a third party.” Andrews maintains that the Supreme Court
    in Smith reached its conclusion using a specific line of reasoning, recognizing that
    “telephone subscribers ‘realize’ that they send dialed numbers to the telephone company”
    and by virtue of those numbers appearing on their monthly bills “subscribers ‘realize’ that
    the dialed numbers are recorded by the telephone company.” Andrews contends that the
    same cannot be said in the instant case. As Andrews points out, the Court in Smith focused
    on the actual knowledge attributed to telephone users and stated:
    All telephone users realize that they must “convey” phone numbers to the
    telephone company, since it is through telephone company switching
    equipment that their calls are completed. All subscribers realize, moreover,
    that the phone company has facilities for making permanent records of the
    numbers they dial, for they see a list of their long-distance (toll) calls on their
    monthly bills.
    
    Id. at 742.
    In that context, the court determined that because the “petitioner voluntarily
    conveyed to [the telephone company] information that it had facilities for recording and
    that it was free to record[,] . . . petitioner assumed the risk that the information would be
    divulged to police.” 
    Id. at 745.
    Although the Supreme Court’s decision in Smith has been applied broadly, see, e.g.,
    United States v. Bynum, 
    604 F.3d 161
    , 162-64 (4th Cir. 2010) (upholding the government’s
    46
    use of a subpoena to obtain a website user’s name, email address, telephone number, and
    physical address—all information that the user entered on the website when he opened his
    account—from a website operator), it remains that a party must voluntarily convey
    information to a third-party, before there is no longer a reasonable expectation of privacy
    in that information. Cf. 
    Jones, 132 S. Ct. at 957
    (Sotomayor, J., concurring) (“This
    approach [in Smith] is ill suited to the digital age, in which people reveal a great deal of
    information about themselves to third parties in the course of carrying out mundane tasks.
    . . . I would not assume that all information voluntarily disclosed to some member of the
    public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment
    protection.” (citation omitted)). Recently, in United States v. 
    Graham, supra
    , the Fourth
    Circuit addressed the application of the third-party doctrine to CSLI and stated:
    [The precedents] simply hold that a person can claim no legitimate
    expectation of privacy in information she voluntarily conveys to a third party.
    It is that voluntary conveyance—not the mere fact that the information winds
    up in the third party’s records—that demonstrates an assumption of risk of
    disclosure and therefore the lack of any reasonable expectation of privacy.
    We decline to apply the third-party doctrine in the present case because a cell
    phone user does not “convey” CSLI to her service provider at all—
    voluntarily or otherwise—and therefore does not assume any risk of
    disclosure to law 
    enforcement. 796 F.3d at 354
    (footnote omitted).
    We agree, once again, with the Graham court and join in the view shared by other
    courts that, “[t]he fiction that the vast majority of the American population consents to
    warrantless government access to the records of a significant share of their movements by
    ‘choosing’ to carry a cell phone must be rejected.” 
    Graham, 796 F.3d at 355-56
    (quoting
    In re United States for an Order Authorizing the Release of Historical Cell-Site Info., 809
    
    47 F. Supp. 2d 113
    , 127 (E.D.N.Y. 2011)). Cell phone users do not actively submit their
    location information to their service provider.
    In the present case, there was no affirmative act like “dialing.” This is made
    abundantly clear by Det. Haley’s testimony stating that “if they’re on the phone, then
    they’re already connected to . . . the [] network[, a]nd we’re not going to be able to pull
    them off of that until . . . they hang up the call.” Det. Haley’s testimony reveals that, in the
    event that an individual is actively using the cell phone to knowingly transmit signals to
    nearby cell towers, the cell site simulator will not be able to access the phone.
    The pin-point location information that led to finding Andrews was obtained
    directly by law enforcement officers and not through a third-party. It is not the case that
    Andrews’s cell phone transmitted information to the service provider that was then
    recorded and shared with law enforcement. Thus, it cannot be said that Andrews “assumed
    the risk” that the information obtained through the use of the Hailstorm device would be
    shared by the service provider as in Smith. The function of the Hailstorm device foreclosed
    that possibility. When asked “how do you get information about where the phone is on the
    [Hailstorm] machine,” Det. Haley responded: “[W]hen [Hailstorm] captures that identifier
    that you put into the machine or the equipment, it then tells you . . . where the signal’s
    coming from[.]” Under the facts of this case, the ultimate location data relied on by the
    police was never transmitted to a third party voluntarily by Andrews. Because there was
    no third-party element to the use of the Hailstorm by the BPD to locate Andrews, Smith is
    inapposite. We conclude the Third Party Doctrine does not apply in this case.
    48
    II.
    Standing
    One of the State’s primary arguments on appeal is that Andrews lacks standing to
    challenge the search of 5032 Clifton Avenue. The State argues that once it challenged
    Andrews’s standing to protest the search of 5032 Clifton Avenue, the burden was on
    Andrews to put on evidence during the suppression hearing to establish Andrews’s “basis
    for claiming he had a reasonable expectation of privacy in the contents of someone else’s
    home.” The State posits the suppression court erred in “finding that there was no need to
    prove standing.”
    Certainly, “[t]he burden is on the defendant to show standing; it is not on the State
    to show non-standing.” State v. Savage, 
    170 Md. App. 149
    , 177 (2006). In Savage,
    however, this Court clarified that standing “[i]s exclusively a threshold question of
    applicability, concerned only with the coverage by the Fourth Amendment of the defendant
    who seeks to raise a Fourth Amendment challenge.” 
    Id. at 174.
    Thus, the burden on a
    proponent of a motion to suppress is to establish “that his own Fourth Amendment rights
    were violated by the challenged search or seizure.” 
    Id. at 175
    (emphasis in Savage)
    (quoting Rakas v. Illinois, 
    439 U.S. 128
    , 130 n.1 (1978)).
    Andrews points out that the State “failed to respond in any meaningful way” to his
    motion to suppress, and did not raise the issue of standing to challenge the search of 5032
    Clifton Avenue until well into the June 4, 2015 suppression hearing. Andrews asserts that
    it was the State’s suggestion that the parties stipulate that the issues before the court be
    decided based on the transcripts, the arrest warrant, the pen register\trap & trace
    49
    application, and the search warrant. Andrews contends the State did not raise the standing
    issue until after the fact-finding portion of the hearing had concluded. At that time, the
    court requested that Andrews address the issue, and defense counsel made a proffer that
    Andrews was an overnight guest at 5032 Clifton Avenue and offered to put him on the
    stand to provide supporting testimony.18 Andrews argues that the State waived any
    argument regarding standing, pointing to the State’s delay, its failure to challenge his
    proffer, and its concession that its trial theory was the fact “that [Andrews] has some
    interest [in 5032 Clifton Avenue] and that is why the gun from this crime, the murder
    weapon, was there with him.”
    We need not pursue the nuances of the parties’ “standing” argument as they have
    framed the issue. We have already determined that Andrews had a reasonable expectation
    of privacy in his aggregate and real-time location information (CLSI) contained in his cell
    phone. See 
    Rakas, 439 U.S. at 139-140
    (stating that “the better analysis forthrightly
    focuses on the extent of a particular defendant’s rights under the Fourth Amendment, rather
    than on any theoretically separate, but invariably intertwined concept of standing[,]” and
    18
    It is plain that an overnight guest has a legitimate expectation of privacy in his
    host’s home and “may claim the protection of the Fourth Amendment.” 
    Carter, supra
    , 525
    U.S. at 90; 
    Savage, 170 Md. App. at 188-89
    . As Andrews points out, defense counsel made
    a proffer that Andrews was an overnight guest and offered to put testimony to that effect
    on the record. The State has not seriously challenged Andrews’s connection to the
    residence, but seeks merely to assert that his unopposed proffer was not sufficient to rebut
    their late challenge. We observe that—after the State sought to rely on earlier transcripts
    to provide necessary testimony, failed to challenge standing during the evidentiary portion
    of the suppression hearing, and left uncontroverted Andrews’s proffer that he was an
    overnight guest—Andrews’s proffer under the circumstances may have been sufficient to
    counter the State’s standing argument.
    50
    “[t]hat inquiry in turn requires a determination of whether the disputed search and seizure
    has infringed an interest of the defendant which the Fourth Amendment was designed to
    protect.”). The search warrant search for 5032 Clifton Avenue was based solely on
    constitutionally tainted information. As the suppression court explained, “I reviewed the
    warrant and it literally says the Defendant was in there so now we need a warrant. And
    information generated from the use of the Hailstorm [is to] be suppressed, that’s all that it
    is.” Because the Fourth Amendment violation of Andrews’s privacy in his real-time CSLI
    provided the only nexus to 5032 Clifton Avenue, Andrews was entitled to challenge that
    search. See Wong Sun v. United States, 
    371 U.S. 471
    , 487-88 (1963) (stating that, in
    determining whether evidence is fruit of the poisonous tree, “the more apt question in such
    a case is whether, granting establishment of the primary illegality, the evidence to which
    instant objection is made has been come at by exploitation of that illegality or instead by
    means sufficiently distinguishable to be purged of the primary taint.” (citation and internal
    quotation marks omitted)). For the foregoing reasons, Andrews had standing to challenge
    the “search” of 5032 Clifton Avenue.
    III.
    The Warrant Requirement
    Having determined that the government’s use of a cell site simulator to obtain
    location information directly from an individual’s cell phone is a “search” under the Fourth
    Amendment, and, therefore, requires a warrant based on probable cause, we now examine
    the state’s reliance on the pen register\trap & trace order issued by the circuit court. First,
    we examine whether the Maryland pen register statute authorized the use of a cell site
    51
    simulator. Second, we examine whether the putative pen register\trap & trace order in this
    case operated as the equivalent of a warrant as the State contends.
    a. The Maryland Pen Register Statute Does Not Authorize the Use of Cell Site
    Simulators Such as Hailstorm
    The function of the Hailstorm device, as illuminated by testimony before the
    suppression court, places it outside the statutory framework of the Maryland pen register
    statute. The statute authorizes the use of the following surveillance methods defined in
    CJP §10-4B-0.1:
    Pen register
    (c)(1) “Pen register” means a device or process that records and decodes
    dialing, routing, addressing, or signaling information transmitted by an
    instrument or facility from which a wire or electronic communication is
    transmitted.
    (2) “Pen register” does not include any device or process used:
    (i) By a provider or customer of a wire or electronic communication service
    for billing, or recording as an incident to billing, for communications services
    provided by the provider or any device used by a provider or customer of a
    wire communication service for cost accounting or other similar purposes in
    the ordinary course of its business; or
    (ii) To obtain the content of a communication.
    Trap and trace device
    (d)(1) “Trap and trace device” means a device or process that captures the
    incoming electronic or other impulses that identify the originating number or
    other dialing, routing, addressing, and signaling information reasonably
    likely to identify the source of a wire or electronic communication.
    (2) “Trap and trace device” does not include a device or process used to
    obtain the content of a communication.
    Wire communication, electronic communication, and electronic
    communication service
    (e) “Wire communication”, “electronic communication”, and “electronic
    communication service” have the meanings stated in § 10-401 of this title.
    52
    The statute specifies that any order issued must identify, if known, “the person to
    whom is leased or in whose name is listed the telephone line or other facility to which
    the pen register or trap and trace device is to be attached or applied.” CJP § 10-4B-
    04(b)(1) (emphasis added).
    Construing the plain language of CJP § 10-4B-01, we determine that it does not, on
    its face, apply to the use of cell site simulators. A “pen register” is “a device or process
    that records . . . signaling information transmitted by an instrument . . . from which a wire
    or electronic communication is transmitted.” CJP § 10-4B-01(c)(1) (emphasis added).
    As discussed above, the Hailstorm device does not passively intercept an electronic
    communication that has been transmitted. Rather, it initiates contact with a cell phone and
    traces the signal received in response. A “trap and trace device” is a “device or process
    that captures the incoming electronic or other impulses that identify the originating
    number or other dialing, routing, addressing, and signaling information reasonably likely
    to identify the source of a wire or electronic communication.” CJP § 10-4B-01(d)(1)
    (emphasis added). The function of the Hailstorm device—to shower an electronic barrage
    of signals into a target area to actively engage the target cell phone—goes well beyond the
    bounds of the pen register statute which by its terms is limited to authorizing devices that
    record or identify the source of a communication or capture an originating number.
    The Maryland pen register statute has been examined in only one reported opinion
    by a Maryland appellate court.19 See Chan v. State, 
    78 Md. App. 287
    , 293 (1989)
    19
    In the federal district court in United States v. Wilford, a defendant more recently
    argued that cell phone pinging was not authorized by Maryland’s pen register statute. 961
    53
    (upholding the use of a trap and trace device pursuant to a court order to obtain data from
    over 5,000 calls over an eighty-day period). In Chan, although this Court determined that
    the newly enacted Maryland pen register statute was not applicable because it did not take
    effect until July 1, 1988, it stated that the new statute “unquestionably cover[ed]” the “trap
    and trace” of incoming calls and observed:
    In response to the Electronic Communications Privacy Act of 1986 passed
    by the Federal Congress, the Maryland General Assembly moved for the first
    time to regulate “pen registers” and “trap and trace” devices by Chapter 607
    of the Acts of 1988. The new regulation is not part of the “Wiretapping and
    Electronic Surveillance” subtitle but is a separate subtitle of its own, 4B,
    dealing with the distinct subject matter of “Pen Registers and Trap and Trace
    Devices.” Its provisions and its wording are virtually verbatim with
    those of its Federal counterpart.
    
    Id. at 308
    (emphasis added).
    In 2001, Congress amended the definition of the term “pen register” in the federal
    counterpart as part of the USA PATRIOT Act. See PL 107–56, October 26, 2001, 115 Stat
    272. Subsequently, in 2002, the Maryland pen register statute was also amended to the
    current versions, reproduced above. 2002 Md. Laws, ch. 100 (H.B. 1036). Notably, since
    F. Supp. 2d 740, 768 (D. Md. 2013), on reconsideration in part (Nov. 27, 2013). In that
    case, the defendant maintained that the statutory language “is limited to providing law
    enforcement numbers that dialed into the target phone and numbers dialed out,” but does
    “not contemplate” the use of a cell phone as a “physical locator/tracking device.” 
    Id. at 769.
    The district court noted that “[n]o judicial decision offers any guidance as to the scope
    of the Maryland statute with respect to pinging.” 
    Id. However, rather
    than address whether
    the collection of CSLI was authorized by the pen register statute, the district court accepted
    that contention arguendo and, instead, based its holding on the unavailability of
    suppression as a remedy for violation of the statute. 
    Id. at 770.
    54
    Chan was decided in 1989, the wording of the Maryland statute remains virtually verbatim
    with its federal counterpart. See 18 U.S.C. § 3127; 18 U.S.C. § 2510.
    Looking then, at the federal statutory scheme, we note that the federal
    Communications Assistance for Law Enforcement Act (“CALEA”), which delineates a
    telecommunications carrier’s duty to cooperate in the interception of communications for
    law enforcement purposes, provides that “with regard to information acquired solely
    pursuant to the authority for pen registers and trap and trace devices (as defined in section
    3127 of Title 18), such call-identifying information shall not include any information
    that may disclose the physical location of the subscriber (except to the extent that the
    location may be determined from the telephone number).” 47 U.S.C. § 1002 (2015)
    (emphasis added). Thus, federal law specifies that the federal equivalent to the Maryland
    pen register statute does not authorize location information. Rather, the federal scheme
    allows the government to use a mobile tracking device through warrant or other order as
    contemplated in 18 U.S.C. § 3117 and Federal Rule of Criminal Procedure 41.
    Although there are no reported opinions that address whether the collection of real-
    time cell site location information (CSLI) is authorized under the Maryland’s pen register
    statute, numerous federal courts construing the virtually identical federal statutes have
    found no statutory authorization for obtaining such information without demonstrating
    probable cause. In 2005, the United States District Court for the Southern District of Texas
    held that the government must demonstrate probable cause and obtain a search warrant to
    obtain real-time CSLI. In re Application for Pen Register & Trap/Trace Device with Cell
    55
    Site Location Auth., 
    396 F. Supp. 2d 747
    , 759 (S.D. Tex. 2005). Construing the federal
    statutes, the district court stated:
    Tracking device information such as cell site data is plainly not a form of
    electronic communication at all.
    ***
    This type of surveillance is unquestionably available upon a traditional
    probable cause showing under Rule 41 [for a mobile tracking device]. On the
    other hand, permitting surreptitious conversion of a cell phone into a tracking
    device without probable cause raises serious Fourth Amendment concerns,
    especially when the phone is monitored in the home or other places where
    privacy is reasonably expected.
    
    Id. at 759,
    765. See also In re Application of the United States for an Order Authorizing
    Installation & Use of a Pen Register, 
    415 F. Supp. 2d 211
    , 219 (W.D.N.Y. 2006) (holding
    that the government was not entitled to real-time CSLI by statute and thus, was required to
    make a “showing that there exists probable cause to believe that the data sought will yield
    evidence of a crime.”). Directly addressing the use of a cell site simulator (such as Stingray
    or Hailstorm) to obtain real-time CSLI for tracking purposes, the District Court for the
    Southern District of Texas determined that, rather than merely capturing signaling
    information as contemplated in the federal pen register statute, the use of a cell site
    simulator constituted a mobile tracking device. In re the Application of the United Sates.
    for an Order Authorizing the Installation & Use of a Pen Register & Trap & Trace Device,
    
    890 F. Supp. 2d 747
    , 752 (S.D. Tex. 2012).
    We acknowledge that law enforcement has long relied on pen register\trap & trace
    orders for valid and vital investigative purposes. They will continue to do so. The pen
    register statute, however, is limited by its terms and is not intended to apply to other, newer
    56
    technologies. Thus we hold that a pen register\trap & trace order is not sufficient to
    authorize use of the Hailstorm.20
    Criminal Procedure § 1-203.1
    Although at the time Andrews was arrested Maryland did not have a corollary to the
    provision in Federal Rule of Criminal Procedure 41 that specifically authorizes issuance of
    a warrant for a mobile tracking device, Maryland has since enacted a statute authorizing
    law enforcement to obtain real-time CSLI, effective October 1, 2015. Maryland Code
    (2001, 2008 Repl. Vol., 2015 Supp.) Criminal Procedure Article (“CP”) § 1-203.1. The
    statute provides that a court may issue an order allowing an officer to obtain real-time
    location information from an electronic device based on probable cause that:
    (i) a misdemeanor or felony has been, is being, or will be committed by the
    owner or user of the electronic device or by the individual about whom
    location information is being sought; and
    (ii) the location information being sought:
    1. is evidence of, or will lead to evidence of, the misdemeanor or
    felony being investigated; or
    20
    Federal law enforcement agencies have recognized that they need to obtain
    warrants rather than rely on less rigorous legal authorizations before utilizing cell site
    simulators. On September 3, 2015, the United States Justice Department of Justice
    announced a new policy setting forth required practices with respect to the treatment of
    information collected through the use of cell site simulators and stated:
    While the department has, in the past, obtained appropriate legal
    authorizations to use cell-site simulators, law enforcement agents must
    now obtain a search warrant supported by probable cause before using
    a cell-site simulator.
    Justice News, Justice Department Announces Enhanced Policy for Use of Cell-Site
    Simulators, DOJ 15-1084 (2015) (emphasis added).
    57
    2. will lead to the apprehension of an individual for whom an arrest
    warrant has been previously issued.
    CP § 1-203.1(b)(1). The Fiscal and Policy Note prepared by the Department of Legislative
    Services for the General Assembly concerning this statute when it was first proposed,
    recognized that law enforcement officers were using the Maryland pen register statute to
    obtain cell phone-related information.     It explained that the proposed statute would
    specifically authorize the capture of CSLI in accord with several recent federal court
    decisions finding that probable cause was needed to obtain such information. Fiscal and
    Policy Note (Revised), Senate Bill 698, Criminal Procedure – Electronic Device Location
    Information – Order (2014). The fiscal and policy note also contemplated the use of cell
    site simulators and stated:
    While cell phone records are usually obtained from a cell phone provider,
    technology is making it possible for law enforcement to bypass these
    companies altogether. Certain devices allow law enforcement to obtain
    location data by imitating a cell phone tower, getting a phone to connect with
    it, and measuring signals from the phone to pinpoint its location. The device,
    which is being used by the Federal Bureau of Investigation, the military, and
    local law enforcement, is known by several trade names, including StingRay,
    KingFish, and LoggerHead.
    Notably, CP § 1-203.1 contains safeguards and limitations not found in the
    Maryland pen register statute, including a thirty-day durational limit on the collection of
    location information unless an extension is sought on continuing probable cause, and a
    provision requiring notice to the user or owner of the monitored device within 10 days
    absent a showing of good cause to delay. CP § 1-203.1(c) & (d).
    The parties have briefed extensively their view of the meaning and application of
    CP 1-203.1. Other than to provide context for the history of the Maryland pen register
    58
    statute and our conclusion that it was not intended to cover cell site simulators, we do not
    address the application of CP 1-203.1 and decline to opine as to whether an order under
    CP 1-203.1 will suffice to satisfy the requirements of a warrant based on probable cause.
    In sum, we conclude that the purpose of Maryland’s pen register statute is to capture
    information resulting from two-way, electronic or wire communications. Nothing in the
    plain language of CJP § 10-4B-01 et seq. suggests that it was ever intended to allow
    surveillance technology that can exploit the manner in which a cell phone transmits data to
    convert it into a mobile tracking device. Accordingly, an order issued pursuant to CJP §
    10-4B-04 cannot authorize the use of a cell site simulator, such as Hailstorm. Because
    there was no statutory authorization for the BPD’s use of the Hailstorm cell site simulator,
    we hold that the BPD should have sought a warrant or a specialized order upon a
    particularized showing of probable cause, and based on sufficient information about the
    technology involved to permit the court to contour reasonable limitations on the scope and
    manner of the BPD’s use of the device.21 See, e.g., In re Application of the United States
    for an Order Authorizing Installation & Use of a Pen 
    Register, 415 F. Supp. 2d at 219
    .
    b. The Order Obtained by the State Was Not Equivalent to a Warrant
    The State insists that its use of the Hailstorm device to track Andrews’s cell phone
    was authorized by the court order. In the absence of a specific statute that would have
    21
    To the extent that the State makes a limited argument that there is no suppression
    remedy available for violation of the sections 10-4B-01 et seq., we respond simply that the
    circuit court found, and we agree, that the use of the cell site simulator was a Fourth
    Amendment violation and, thereby, the exclusionary rule applies. The fact that there may
    have been a contemporaneous violation of sections 10-4B-01 et seq. does not limit the
    available remedy.
    59
    authorized the use of a cell site simulator at the time Andrews was arrested, the State
    presses that “the police erred on the side of caution and obtained a court order specifically
    authorizing the use of a cellular tracking device to find Andrews’s phone[,]” pursuant to
    the “nearest analog”—the Maryland pen register statute. The State acknowledges that the
    court order described in the Maryland pen register statute does not use the words “warrant”
    or “probable cause.” Nevertheless, the State argues that, in this case, the BPD’s application
    and the resulting order “went far beyond the requirements of the statute.”
    The State points out that the BPD application was for an order allowing the police
    to employ surreptitious or duplication of facilities, technical devices or
    equipment to accomplish the installation and use of a Pen Register\Trap &
    Trace and Cellular Tracking Device [. . .] and shall initiate a signal to
    determine the location of the subject’s mobile device on the service
    provider’s network or with such other reference points as may be
    reasonabl[y] available . . .
    The State also notes that the resultant order states that probable cause exists to authorize
    the use of a “Cellular Tracking Device.” Thus, the State contends that because the pen
    register\trap & trace order stated that it was based upon a finding of probable cause, it was,
    therefore, “the functional equivalent of a warrant.”
    Andrews emphasizes that the order may issue on just a showing “that the
    information likely to be obtained by the installation and use is relevant to an ongoing
    criminal investigation.” CJP § 10-4B-04(a)(1).         In addition to the fact that a pen
    register\trap & trace order does not contemplate the use of a cell site simulator, Andrews
    points out that it also does not satisfy the requirements that a warrant based on probable
    cause be attached to a specific suspected crime, be confined in scope, or describe with
    60
    particularity the place to be searched or the person to be seized. Andrews contends that
    “[t]he moment BPD conducted surveillance with something other than a pen register, it
    exceeded the purview of the pen register order.” Further, Andrews contends that BPD’s
    application “For an Order Authorizing the Installation and Use of a Device Known as a
    Pen Register/Trap & Trace,” was intentionally captioned to ensure that the circuit court
    scrutinized it according to the statutory pen register factors. Andrews argues that BPD’s
    “disingenuous efforts” hid from the circuit court “the scope, intensity, [and] nature of the
    search,” and prevented the court from conducting a proper probable cause analysis.
    We begin with our appraisal that an order issued under the pen register statute is not
    the equivalent of a warrant based on probable cause—a fact the State implicitly concedes
    in its argument that it “went beyond the requirement of the statute.”        The applicable
    requirements of the statute are contained first in § 10-4B-03:
    (b) Contents. — An application under subsection (a) of this section shall
    include:
    (1) The identity of the State law enforcement or investigative officer
    making the application and the identity of the law enforcement agency
    conducting the investigation; and
    (2) A statement under oath by the applicant that the information likely
    to be obtained is relevant to an ongoing criminal investigation being
    conducted by that agency.
    Additionally, 10-4B-04(a) states that an order may issue if the court finds the information
    likely to be obtained by the device is relevant to an ongoing criminal investigation, and the
    order must:
    (3) Specify the attributes of the communications to which the order applies,
    including the number or other identifier and, if known, the location of the
    telephone line or other facility to which the pen register or trap and trace
    61
    device is to be attached or applied, and, in the case of a trap and trace device,
    the geographic limits of the trap and trace order;
    (4) Contain a description of the offense to which the information likely to be
    obtained by the pen register or trap and trace device relates[.]
    CJP § 10-4B-04(b)(3) & (4). Plainly, this limited showing falls short of the particularity
    required for the issuance of a search warrant. See Illinois v. Gates, 
    462 U.S. 213
    , 238
    (1983) (“The task of the issuing magistrate is simply to make a practical, common-sense
    decision whether . . . there is a fair probability that contraband or evidence of a crime will
    be found in a particular place.”); Nero v. State, 
    144 Md. App. 333
    , 345-46 (2002) (“General
    warrants, of course, are prohibited by the Fourth Amendment. . . . [T]he problem [posed
    by the general warrant] is not that of intrusion per se, but of a general, exploratory
    rummaging in a person’s belongings. . . . [The Fourth Amendment addresses the problem]
    by requiring a ‘particular description’ of the things to be seized.” (quoting Andresen v.
    Maryland, 
    427 U.S. 463
    , 480 (1976))).
    Moving to the State’s argument that the order was sufficient because it went beyond
    the requirements of the statute, we start by rejecting the State’s contention that the words
    “probable cause” contained in the pen register application and order converted the over-
    reaching order into a warrant.    The “probable cause” articulated in the resulting order is
    merely that “information likely to be obtained . . . is relevant to an ongoing criminal
    investigation.” (Emphasis in original). Certainly, while this reflects the standard required
    for issuance of an order under CJP § 10-4B-04, it falls far short of the particularity required
    to support a search warrant. See 
    Gates, 462 U.S. at 238
    ; 
    Nero, 144 Md. App. at 345-46
    .
    In the information “offered in support of probable cause” the application states:
    62
    Your Applicant hereby certifies that the information likely to be
    obtained concerning [Andrews’s] location will be obtained by learning the
    numbers, locations and subscribers of the telephone number(s) being dialed
    or pulsed from or to the aforesaid telephone and that such information is
    relevant to the ongoing criminal investigation.
    Plainly, the State’s use of the Hailstorm device extended far beyond this certification as to
    how information concerning Andrews’s location would be obtained.
    Here, the State inserted language into its application and proposed order attempting
    to, without being specific, obtain court authorization for more than a pen register\trap &
    trace order.   Although the application does request authorization to use a “Cellular
    Tracking Device,” it fails to name or describe any cell site simulator. In fact, there is
    absolutely nothing in the application or order that identifies the Hailstorm device, or
    provides even a rudimentary description of cell site simulator technology. The application
    also failed to identify any geographical limitation to the BPD’s use of the undisclosed
    surveillance technology, and did not explain what was to be done with the information
    collected. Nor did the application disclose the possibility that the technology employed
    may capture the cell phone information (unique serial numbers) of innocent third parties in
    range of the target area. Finally, we are troubled that the application for a pen register\trap
    & trace order did not fully apprise the circuit court judge from whom it was sought of the
    information that it would yield. Based on the application that he received, the circuit judge
    was entitled to expect that the results would be a list of telephone numbers that Andrews
    called and that called Andrews—not a real-time fix on his location.
    We determine that the pen register\trap & trace order in this case failed to meet the
    requirements of a warrant.       To allow the government to collect real-time location
    63
    information on an unknown number of private cell phones, without any geographic
    boundaries, without any reporting requirements or requirements that any unrelated data be
    deleted, and without a showing of probable cause that contraband or evidence of a
    particular crime will be found through the particular manner in which the search is
    conducted would certainly run afoul of the Fourth Amendment. As stated in our holding
    above, unless a valid exception to the warrant requirement applies,22 the government may
    not use a cell phone simulator without a warrant or, alternatively, a specialized order that
    requires a particularized showing of probable cause, based on sufficient information about
    the technology involved to allow a court to contour reasonable limitations on the scope and
    manner of the search, and that provides adequate protections in case any third-party cell
    phone information might be unintentionally intercepted. To hold otherwise would be to
    22
    One of the exceptions more commonly relied upon applies when ‘the exigencies
    of the situation make the needs of law enforcement so compelling that [a] warrantless
    search is objectively reasonable under the Fourth Amendment.’” Kentucky v. King, 
    563 U.S. 452
    , 460 (2011) (some internal quotation marks omitted) (quoting Mincey v. Arizona,
    
    437 U.S. 385
    , 394 (1978)). Maryland has recognized that “[e]xigent circumstances exist
    when a substantial risk of harm to the law enforcement officials involved, to the law
    enforcement process itself, or to others would arise if the police were to delay until a
    warrant could be issued.” Williams v. State, 
    372 Md. 386
    , 402 (2002) (citations omitted).
    It remains the State’s burden to establish exigent circumstances sufficient to justify a
    warrantless search. Wengert v. State, 
    364 Md. 76
    , 85 (2001) (citations omitted). We note
    that the Supreme Court in 
    Riley, supra
    , rejected the argument that officer safety, in that
    case, presented an exigent circumstance that justified officer’s accessing content on a cell
    phone seized in a search incident to arrest. The Court observed that “[t]o the extent dangers
    to arresting officers may be implicated in a particular way in a particular case, they are
    better addressed through consideration of case-specific exceptions to the warrant
    requirement, such as the one for exigent 
    circumstances.” 134 S. Ct. at 2486
    .
    64
    abandon the Fourth Amendment by assuming, without any foundation, that the citizens of
    Maryland have forfeited their reasonable expectation of privacy in their personal location.
    IV.
    The Exclusionary Rule
    a. The Search Warrant Does Not Survive Removal of the Constitutionally
    Tainted Information.
    The State contends that the search warrant that was obtained for 5032 Clifton
    Avenue was valid because probable cause existed once “Andrews was found in the home.”
    According to the State, Andrews was arrested pursuant to a valid arrest warrant and the
    police had “the consent of the apparent owner of the home to enter the home to take
    Andrews into custody.” Thus, the State argues, “[n]othing about the way in which
    Andrews was located negated the probable cause to believe that there could be evidence of
    the crimes at that address.”
    In riposte, Andrews avers that without the location data provided by the cell site
    simulator, “the BPD possessed no nexus between the criminal activity at hand and 5032
    Clifton Avenue.” Andrews asserts that, “[b]ecause the search warrant relied entirely on
    that nexus, it withers as fruit of the poisonous tree.”
    First, we note that where entry into a protected space “was demanded under color
    of office” and “granted in submission to authority,” that submission does not equate to a
    waiver of a constitutional right. 
    Johnson, supra
    , 333 U.S. at 13 (citing Amos v. United
    States, 
    255 U.S. 313
    (1921). Thus, the existence of an arrest warrant and the consent of
    65
    the owner of the residence do not, in themselves, diminish Andrews’s protection under the
    Fourth Amendment. Nor do they render the later-acquired search warrant unassailable.
    Second, the courts of Maryland have recognized that where a search warrant relies
    on information obtained in violation of the constitution, the question is “whether ‘after the
    constitutionally tainted information is excised from the warrant, the remaining information
    is sufficient to support a finding of probable cause.’” Redmond v. State, 
    213 Md. App. 163
    , 191-92 (2013) (quoting Williams v. State, 
    372 Md. 386
    , 419 (2002)). See also 
    Karo, 468 U.S. at 720-21
    (stating that in determining whether evidence seized pursuant to a
    contested warrant remains admissible, one of the pertinent questions is whether “the
    warrant affidavit, after striking the [constitutionally tainted] facts . . . contained sufficient
    untainted information to furnish probable cause for the issuance of the search warrant.”)
    Here, there can be no doubt that the only information linking Andrews and 5023 Clifton
    Avenue was the fruit of the Fourth Amendment violation. The State presents no credible
    argument that evidence of Andrew’s presence in the home was obtained by independent
    lawful means.
    In Redmond v. State, the BPD were investigating an armed robbery in which a cell
    phone was 
    stolen. 213 Md. App. at 169
    . During their investigation, detectives contacted
    the victim’s mobile service provider and, “by triangulating the signal from cell phone
    towers in the area, determined that the stolen cell phone was in the proximity of 3303
    Round Road.” 
    Id. at 169.
    Thereafter, detectives began moving from house to house in the
    area, speaking to residents using a ruse that they were “looking for a pedophile named
    ‘Leroy Smalls.’” 
    Id. at 170.
    After obtaining consent to enter the appellant’s residence
    66
    under those false pretenses, one of the detectives surreptitiously dialed the number of the
    stolen cell phone, heard it ringing upstairs, and then walked through the entire house
    conducting a “protective sweep” including opening closet doors and checking under beds.
    
    Id. at 171.
    Officers then sought a search warrant for the home on the basis of what they had
    discovered in the home. 
    Id. at 171-72.
    After a careful analysis, we determined that “[b]y dialing the number of the stolen
    cell phone and walking upstairs to locate it, the police exceeded the scope of any consent
    that was given to their presence inside 3303 Round Road.” 
    Id. at 189-90.
    Applying the
    exclusionary rule, we noted that “all the information . . . attested to in applying for the
    search warrant (and on which the search warrant was granted) . . . was discovered during
    the initial illegal entry.” 
    Id. at 192.
    We determined that the search warrant was not issued
    based on an independent lawful source and the unlawfully obtained evidence should be
    suppressed.23 
    Id. And, we
    soundly rejected the argument that evidence in a warrant
    23
    Although the warrant application in Redmond mentioned reliance on
    “sophisticated mobile and/or portable surveillance equipment” to locate the stolen cell
    phone, in that case we observed that:
    Detective Jendrek did not testify that the ATT used any “sophisticated mobile
    and/or portable surveillance equipment” while in the 3300 block of Round
    Road. Rather, his testimony was that the ATT detectives confirmed the
    precise location of the cell phone by use of ordinary police investigatory
    tactics: speaking to the occupants of two houses, dialing the number of the
    stolen cell phone, listening for it to ring, and, ultimately, physically observing
    the stolen cell phone lying on a dresser.
    Thus, to the extent that the averments in the search warrant application
    represent that the ATT detectives used “sophisticated” means to locate the
    67
    application was obtained by independent lawful means “(1) where the officer’s decision to
    seek the warrant was prompted by what they had seen during the initial entry; and (2) where
    information obtained during that entry was presented to the [judge] and affected his [or
    her] decision to issue the warrant.”      
    Id. at 191
    (internal quotation marks omitted)
    (alterations in Redmond) (quoting Kamara v. State, 
    205 Md. App. 607
    , 627-28 (2012). See
    also Murray v. United States, 
    487 U.S. 533
    , 534 (1988) (“The ultimate question is whether
    the search pursuant to warrant was in fact a genuinely independent source of the
    information and tangible evidence at issue. This would not have been the case if the agents’
    decision to seek the warrant was prompted by what they had seen during the initial entry
    or if information obtained during that entry was presented to the Magistrate and affected
    his decision to issue the warrant.”).
    As in Redmond, here, the evidence that forms the only basis for probable cause in
    the State’s search warrant application—that Andrews was at 5032 Clifton Avenue—was
    that obtained through an unlawful search—in this case, the BPD’s use of the Hailstorm
    device. We agree with the circuit court’s determination that there was no independent
    lawful source to establish a nexus between Andrews and the residence. Cf. Agurs v. State,
    
    415 Md. 62
    , 84 (2010) (stating that “police should have been aware that there must be a
    stolen cell phone while at the scene on the afternoon of March 2, 2010, they
    are simply 
    inaccurate. 213 Md. App. at 193
    . The defendant in Redmond did not challenge the use of any such
    device or the use of cell tower information. Accordingly, in Redmond we did not address
    the use of sophisticated mobile surveillance systems, as we must in the matter sub judice.
    68
    nexus between criminal activity and the place to be searched.”). Accordingly, once the
    constitutional taint is removed from the search warrant in this case, what remains is
    insufficient to establish probable cause for a search of 5032 Clifton Avenue and, as
    discussed further infra, the evidence seized in that search withers as the fruit of the
    poisoned tree. Franks v. Delaware, 
    438 U.S. 154
    , 156 (1978) (stating that if “the affidavit’s
    remaining content is insufficient to establish probable cause, the search warrant must be
    voided and the fruits of the search excluded to the same extent as if probable cause was
    lacking on the face of the affidavit.”). Therefore, we affirm the suppression court’s
    exclusion of all evidence found at 5032 Clifton Avenue.
    b. The State Cannot Rely on the Good Faith Exception
    Finally, the State argues that BPD’s relied in good faith on the search warrant issued
    for 5032 Clifton Avenue after locating Andrews inside that address. The State asserts that
    police officers relied on, first, the pen register\trap & trace order, and, second, on the later
    issued search warrant for the premises. The State maintains that “[t]his is good faith
    squared[,]” and there is “simply no officer misconduct to deter in this case.” Thus, the
    State contends that the exclusionary rule should not apply in this case.
    Andrews contends that without the location information provided by the cell site
    simulator the BPD possessed no nexus between him and 5032 Clifton Avenue, and,
    “[b]ecause the search warrant relied entirely on that nexus, it withers as the fruit of the
    poisonous tree.” Andrews asserts that where the information relied on to obtain a warrant
    is the product of a Fourth amendment violation, the fruit of the poisonous tree doctrine
    69
    trumps the good faith exception. Moreover, Andrews argues that good faith cannot apply
    where “law enforcement officers, from the outset, dealt dishonestly with the judiciary.”
    In United States v. Leon, the Supreme Court held that, where officers have acted in
    good faith pursuant to a warrant that was later discovered to be invalid, exclusion is not
    warranted to deter police over-reach or misconduct. 
    468 U.S. 897
    , 924 (1984). The
    Supreme Court cautioned, however, that
    [t]he good-faith exception for searches conducted pursuant to warrants is not
    intended to signal our unwillingness strictly to enforce the requirements of
    the Fourth Amendment, and we do not believe that it will have this effect. As
    we have already suggested, the good-faith exception, turning as it does on
    objective reasonableness, should not be difficult to apply in practice. When
    officers have acted pursuant to a warrant, the prosecution should ordinarily
    be able to establish objective good faith without a substantial expenditure of
    judicial time.
    In Fitzgerald v. State, this Court aptly summarized the “good faith” exception:
    Because the only purpose of the Exclusionary Rule of Mapp v. Ohio, 
    367 U.S. 643
    , 
    81 S. Ct. 1684
    , 
    6 L. Ed. 2d 1081
    (1961), is to deter unreasonable
    police behavior, Leon and [Massachusetts v. Sheppard, 
    468 U.S. 981
    (1984)]
    held that a mistake made by a judge in issuing a warrant should not be
    attributed to the police officer who executes it. Because the officer has been
    reasonable in relying on the judge’s legal expertise, it would serve no
    deterrent purpose to exclude otherwise competent, material, and trustworthy
    evidence. See Connelly v. State, 
    322 Md. 719
    , 720–21, 
    589 A.2d 958
    (1991).
    
    153 Md. App. 601
    , 655-56 (2003) aff’d, 
    384 Md. 484
    (2004). However, this Court
    observed that in 
    Karo, supra
    , the Supreme Court instructed that, if the information obtained
    through a Fourth Amendment violation “proved critical to establishing probable cause for
    the issuance of the warrant,” it would invalidate the subsequent search warrant for the
    house. 
    Id. at 656
    (citing 
    Karo, supra
    , 468 U.S. at 719). Accordingly, “the conclusion may
    readily be drawn that in the case of an antecedent Fourth Amendment violation which
    70
    contributes to a warrant application, the ‘fruit of the poisoned tree’ doctrine ‘trumps’ the
    officer’s ‘good faith’ reliance under Leon and Sheppard.” 
    Id. Here, as
    we noted above, the BPD submitted an overreaching pen register\trap &
    trace application that failed to clearly articulate the intended use, i.e., to track Andrews’s
    cell phone using an active cell site simulator. The ensuing order did not support the use of
    the Hailstorm device, nor did it, in any way, serve as a de facto warrant for the use of the
    Hailstorm device. As the State’s May 15, 2015 supplemental disclosure made clear,
    “WATF did not have the Clifton Ave address as a possible location until ATT provided
    that information.” Only after receiving that information through the use of the Hailstorm
    device and arresting Andrews at the premises did the same BPD officers who submitted
    the pen register\trap & trace application then apply for a search warrant.
    As Andrews points out, without the antecedent Fourth Amendment violation the
    nexus between the residence to be searched and the alleged criminal activity could not have
    been established. Cf. 
    Agurs, 415 Md. at 84
    (stating that “police should have been aware
    that there must be a nexus between criminal activity and the place to be searched.”). In the
    present case, the antecedent Fourth Amendment violation was the only basis upon which
    the search warrant application stood, and the fruit of the poisoned tree doctrine does,
    indeed, trump alleged good faith reliance on the part of BPD. See Fitzgerald, 153 Md.
    App. at 656.
    The Supreme Court in Leon, was clear that “the officer’s reliance on the magistrate’s
    probable-cause determination and on the technical sufficiency of the warrant he issues must
    be objectively 
    reasonable.” 468 U.S. at 922
    . See, e.g., Spence v. State, 
    444 Md. 1
    , 12-13
    71
    (2015) (wherein the police officer, in searching a cell phone and reading text messages
    during a search incident to arrest, was acting in good faith reliance on then-controlling
    authority in Maryland); 
    Agurs, 415 Md. at 83
    (concluding that the good faith exception did
    not apply where “no reasonably well-trained police officer could have relied on the warrant
    that authorized the search of Agurs’ home.”). We cannot say the BPD officers in this case
    reasonably relied on the warrant obtained through their own misleading order application
    and unconstitutionally intrusive conduct. To do so would allow law enforcement to
    insulate its own errors merely by presenting limited information to a magistrate, obtaining
    a warrant post-intrusion, and then re-entering the place to be searched. The good faith
    exception to the exclusionary rule seeks to avoid “[p]enalizing the officer for the
    magistrate’s error, rather than his own.” Leon, 468 U.S at 921. That is, however, not that
    case here. See 
    id. at 919
    (“The deterrent purpose of the exclusionary rule necessarily
    assumes that the police have engaged in willful, or at the very least negligent, conduct
    which has deprived the defendant of some right. By refusing to admit evidence gained as
    a result of such conduct, the courts hope to instill in those particular investigating officers,
    or in their future counterparts, a greater degree of care toward the rights of an accused.”
    (quoting United States v. Peltier, 
    442 U.S. 531
    , 539 (1975))).
    It is for all of these reasons that we hold that the evidence obtained in the search of
    5032 Clifton Avenue is inadmissible as fruit of the poisoned tree and was properly
    excluded by the suppression court.
    72
    JUDGMENTS OF THE CIRCUIT
    COURT FOR BALTIMORE CITY
    AFFIRMED.
    COSTS TO BE PAID BY MAYOR AND
    CITY COUNCIL OF BALTIMORE.
    73