Wheeler v. State , 135 A.3d 282 ( 2016 )


Menu:
  •            IN THE SUPREME COURT OF THE STATE OF DELAWARE
    CHRISTOPHER WHEELER,                   §
    §      No. 205, 2015
    Defendant Below,                 §
    Appellant,                       §      Court Below:
    §
    v.                               §      Superior Court
    §      of the State of Delaware
    STATE OF DELAWARE,                     §
    §      Cr. I.D. No. 1310019248
    Plaintiff Below,                 §
    Appellee.                        §
    Submitted: January 20, 2016
    Decided: March 2, 2016
    Before STRINE, Chief Justice; HOLLAND, VALIHURA, VAUGHN, and SEITZ,
    Justices, constituting the Court en Banc.
    Upon appeal from the Superior Court. REVERSED AND REMANDED.
    Thomas A. Foley, Esquire, Wilmington, Delaware for Appellant.
    Andrew J. Vella, Esquire, Department of Justice, Wilmington, Delaware for Appellee.
    VALIHURA, Justice:
    In this direct appeal, Christopher Wheeler (“Wheeler”) seeks to overturn his
    conviction of Dealing in Child Pornography. He raises two issues. First, he challenges
    a September 18, 2014 decision of the Superior Court denying his Amended and
    Superseding Motion to Suppress (“Motion to Suppress”). The Motion to Suppress sought
    to exclude evidence collected from Wheeler’s home and office during a search executed
    pursuant to two warrants related to witness tampering. The challenged warrants covered
    Wheeler’s entire digital universe and essentially had no limitations. In performing the
    search, officers seized 19 electronic devices and other digital media. Despite the broad,
    generalized language in the challenged warrants, the State found no evidence of witness
    tampering on any of Wheeler’s devices. But when performing a cursory search of the
    data on an iMac found in Wheeler’s piano room closet (the “iMac”), police discovered
    files containing child pornography. Wheeler contends that the search warrants were in
    the nature of “general warrants” and were overly broad in scope, in violation of the
    Fourth Amendment to the United States Constitution and Article I, § 6 of the Delaware
    Constitution.1
    Second, Wheeler appeals from a December 22, 2014 decision of the Superior
    Court denying his Motion to Dismiss and/or for Judgment of Acquittal (“Motion for
    Judgment of Acquittal”). Wheeler was charged with 25 identical counts of Dealing in
    Child Pornography based upon 25 images of child sexual exploitation—all of which were
    found on the iMac. Wheeler argues that there was insufficient evidence to convict him
    1
    Wheeler is joined by amicus curiae, American Civil Liberties Union Foundation of Delaware
    (the “ACLU”), which filed a brief in support of reversal.
    1
    because the State could not establish that he was aware of the existence of the offending
    images in his “newsgroup cache.” The State admits it has no proof that Wheeler ever
    viewed any of the images, which automatically “cached” on his computer, with no human
    intervention, as a result of his subscription to certain “newsgroups.”        Wheeler was
    sentenced to 50 years at Level V.
    Throughout these proceedings, Wheeler has asserted that the State utilized charges
    of witness tampering stemming from his admission in 2013 that he had molested two
    brothers in Pennsylvania in the 1980’s as a pretext to search broadly for child
    pornography. The challenged warrants in this case are the witness tampering warrants—
    not the later-obtained child pornography warrant.         But the State admits that the
    challenged witness tampering warrants were virtual copies of an off-the-shelf warrant for
    child pornography.
    Because we agree that the challenged witness tampering warrants were in the
    nature of “general warrants” in violation of the United States and Delaware Constitutions,
    we reverse the judgments of the Superior Court and remand this matter for further
    proceedings in accordance with this Opinion.
    I.     FACTS
    A.     Christopher Wheeler
    Christopher Wheeler is the former headmaster at the Tower Hill School (“Tower
    Hill”) in Wilmington, Delaware. He has an adult son, NK,2 whom he adopted when NK
    2
    Because the victims in this matter were juveniles at the time they were subject to abuse, we
    have assigned pseudonyms sua sponte.
    2
    was twelve or thirteen.3 In the 1980’s, Wheeler lived with the “W” family in West
    Chester, Pennsylvania for months at a time. The Ws took in a number of students that
    attended the Westtown School, where the three W brothers went to school.4 Wheeler was
    one of these students. Wheeler was approximately 16 or 17 when he began living with
    the Ws. Even after he left Westtown School, Wheeler maintained a relationship with the
    W family.
    Approximately 35 years ago, Wheeler sexually abused two of the W brothers. In
    2005, Wheeler returned to the Delaware area after having spent time in Illinois with his
    adopted son. Wheeler became the headmaster of Tower Hill. In 2008, Wheeler and NK
    lived with the Ws before moving onto the Tower Hill campus.
    B.     In 2013, the W Brothers Confront Wheeler About the Abuse Wheeler Inflicted
    on Them in the Early 1980’s
    After the Jerry Sandusky scandal broke, one of the W brothers, MW, resolved to
    tell his two adult brothers, SW and TW, that Wheeler had molested him when he was
    approximately 11 to 13 years old, at a time when Wheeler was in his early-20’s. Upon
    hearing this, SW told his brothers that Wheeler had also molested him when he was
    approximately 13 to 15 years old. TW told MW and SW that, although Wheeler had
    never physically or sexually abused him, Wheeler had inappropriate sexual conversations
    with TW when TW was a boy.
    After the W brothers told each other about their past experiences with Wheeler,
    MW wrote Wheeler a letter. The letter read, in part: “I shudder at the notion that you, in
    3
    A27 (Affidavit 1 ¶ 6).
    4
    A135.
    3
    your career, have chosen an environment that brings you into daily contact with other
    boys who are as old as I was when you molested me.”5 MW’s letter also provided that
    MW “wants nothing to do with Chris Wheeler ever and wants him to stay away from him
    and his family.”6 MW supplied Investigator Robert Schreiber (“Investigator Schreiber”)
    of the Delaware Department of Justice with a copy of the letter.
    On July 20, 2013, SW also wrote Wheeler. MW provided Investigator Schreiber
    with a “draft” of SW’s letter. Unlike MW’s letter, SW’s three-page letter invited a
    response from Wheeler. It read, in part:
    If I had known the torment, pain, humiliation, and anger that your
    molestation and abuse of me as a child would cause me these 35 years later,
    I would have had greater strength to stand up to you and defend myself.
    The fact that you preyed upon me in my own home, from the room next to
    mine, is lewd and inexcusable. The reality that you continue to shirk any
    responsibility for the harm that you caused, as if it never occurred, will
    continue no longer.7
    *       *   *
    I will not keep quiet and hide from your abuses any longer. I have not yet
    determined how or when to tell my parents of the harm, pain, and
    humiliation that you have caused. . . . The real and full truth must be told
    and brought to light; beginning now.
    The only thing that I am sorry for is that it has taken me this long to gain
    the fortitude to bring your past abuses to the surface, to move towards
    holding you accountable for your predatory and abusive actions. Despite
    my pain and anger, I am curious to return part of the burden to you; what
    does justice look like for Chris Wheeler for the molestation you
    perpetuated, culpability you willingly evade, and the harms that you
    5
    A27 (Affidavit 1 ¶ 10).
    6
    
    Id. 7 A130.
                                                   4
    continue to cause? What role (if any) should you play in determining
    appropriate resolution to and restitution for the abuses you have caused?8
    On July 23, 2013, Wheeler responded to SW’s letter. In his reply letter, Wheeler
    admits his wrongdoing. It reads, in part:
    I will not compound your pain by attempting to deny or in any way deflect
    responsibility for my actions 35 years ago. I did those things. I am the one
    responsible.
    I am profoundly sorry. Some things are unforgivable, so I don’t expect
    forgiveness from any of you. Nevertheless, I ask for your forgiveness.
    *       *      *
    The truth is that I have carried inside of me a profound and loud
    dissonance, an ever-present reminder that some evil has been done and it
    cannot be undone. And I am responsible for it.
    *       *      *
    You hoped for proof of my conscience, my contrition, my sense of
    accountability. Only you know if you see proof of those things in this
    letter. Regarding my compunction to make right the many wrongs that I
    have committed, perhaps this letter is evidence of at least a few steps in that
    direction as well. I’ll wait to hear from you about further appropriate steps
    towards resolution and restitution.9
    MW provided the investigators with a copy of Wheeler’s response. SW told
    investigators that he still had Wheeler’s original response letter and the corresponding
    FedEx envelope in his possession.
    Rather than writing a letter, TW held telephone conversations with Wheeler to
    arrange a face-to-face meeting at Wheeler’s home on July 25, 2013. TW also exchanged
    e-mails with Wheeler, who used his Tower Hill e-mail address. According to TW, at the
    8
    A130-32 (emphasis added).
    9
    A133 (emphasis added).
    5
    meeting, Wheeler apologized for his previous actions and told TW that he was going to
    meet with NK to tell him about his abuse of the W brothers. Wheeler also told TW that
    he had recently contemplated suicide.
    C.     The Witness Tampering Warrants Target Wheeler’s Entire Digital Universe and
    are Cut-and-Pasted from Child Pornography Warrants
    On October 22, 2013, the Wilmington Police Department, working in concert with
    the State of Delaware, sought and obtained two search warrants from the Superior Court.
    The first search warrant (“Warrant 1”) related to Wheeler’s residence in Wilmington,
    Delaware and his 2011 Chevrolet Equinox. The second warrant (“Warrant 2” and jointly
    with Warrant 1, the “Witness Tampering Warrants”) was for Wheeler’s office at Tower
    Hill and for the same vehicle.
    The Witness Tampering Warrants were substantially similar and were each
    supported by a corresponding affidavit of probable cause.10 The Witness Tampering
    Warrants and Affidavits together sought to gather evidence related to two witness
    tampering crimes: (1) Tampering with a Witness under 
    11 Del. C
    . § 1263(3); and (2) Act
    of Intimidation of a Witness under 
    11 Del. C
    . § 3532. The affiants were Detective
    Cecilia E. Ashe (“Detective Ashe”) and Chief Investigator Robert J. Irwin (“Chief
    Investigator Irwin”).    On the date the Witness Tampering Warrants were issued,
    Detective Ashe was an officer with the Wilmington Police Department.                   Chief
    10
    For purposes of this Opinion, Warrant 1’s affidavit of probable cause is referred to as
    “Affidavit 1.” Warrant 2’s affidavit of probable cause is referred to as “Affidavit 2.”
    Collectively, Affidavit 1 and Affidavit 2 are referred to as the “Affidavits.” Similarly, the
    applications in support of the Witness Tampering Warrants are collectively referred to as the
    “Applications.”
    6
    Investigator Irwin was with the Delaware Department of Justice and, at the time, was
    assigned to the Child Predator Task Force. Investigator Schreiber is also mentioned
    throughout the Affidavits, as he provided information to Detective Ashe and Chief
    Investigator Irwin.
    The Affidavits are based in large part on interviews with the W brothers, and
    incorporate the brothers’ statements regarding communications they had with Wheeler in
    July 2013. The police also interviewed MW’s wife and the W brothers’ parents. As to
    NK, the sum of the witness tampering allegations contained in the Affidavits is that an
    officer of the Bluffton Police Department in Bluffton, South Carolina told Investigator
    Schreiber that, while investigating an incident at NK’s South Carolina residence, NK
    informed him that Wheeler would “penetrate his anus and that [NK] never previously
    reported this to the authorities because [Wheeler] would pay him off.”11 The Affidavits
    suggest that this took place in Illinois, but provide no other details regarding Wheeler’s
    alleged tampering with NK.
    The Affidavits state that MW spoke with authorities during the week of October
    14, 2013. MW told personnel in the Department of Justice that approximately 35 years
    ago, when he was 12 or 13 years old, Wheeler molested him. At the time, Wheeler was
    22 or 23 years old. MW also stated that Wheeler molested SW when SW was a boy.12
    11
    A28 (Affidavit 1 ¶ 20).
    12
    A26 (Affidavit 1 ¶ 2). SW told Investigator Schreiber that Wheeler molested him when he
    was approximately 13 to 15 years old. A28 (Affidavit 1 ¶ 15). SW stated that “the sexual abuse
    took place multiple times over a period of months, possibly for a year.” A28 (Affidavit 1 ¶ 15).
    7
    MW advised that the sexual abuse took place when Wheeler lived at the W family
    residence in West Chester, Pennsylvania.
    The Affidavits refer to and quote from the italicized portions of the letters in the
    previous section. The Affidavits also recount that the W brothers decided to confront
    Wheeler about the abuse he had inflicted upon them. The first communication from the
    W brothers to Wheeler occurred in July 2013.
    According to the Affidavits, in July 2013, MW sent a letter to Wheeler,
    confronting him about what had happened. TW also confronted Wheeler in a face-to-
    face meeting in Wilmington, Delaware. On October 22, 2013, TW told Investigator
    Schreiber, according to the Affidavits, that he and Wheeler “communicated via telephone
    and e-mail using [Wheeler’s] Tower Hill [e]-[m]ail address to coordinate a meeting in
    Wilmington and then to communicate since.”
    The Affidavits provide that NK complained about Wheeler to MW’s mother when
    visiting her home in West Chester, Pennsylvania. During a visit, NK “stated that his
    father had abused him[,]” according to the Affidavits. When MW’s mother asked NK
    what he meant, NK responded: “You know. You know.”
    According to the Affidavits, on October 22, 2013, Investigator Schreiber contacted
    Officer Anson Singleton of the Bluffton Police Department. The Affidavits then recite
    the following: “Officer Singleton stated that while investigating the incident at [NK’s]
    residence, [NK] told him that his dad would penetrate his anus and that he never
    previously reported this to the authorities because his father would pay him off. When
    the officer asked [NK] where this occurred, [NK] said it occurred when they lived in
    8
    Illinois.” The Affidavits did not provide a time frame as to when these events allegedly
    occurred.
    The first three sections of the Affidavits set forth the background of the affiants
    (“Section A”), “Terms and Definitions” (“Section B”), and “Issues of Staleness
    Associated with [C]omputer [I]nvestigations” (“Section C”). Sections A and B highlight
    the extensive background of Chief Investigator Irwin in the area of crimes against
    children, and generally describe electronic data, electronic filing systems, hard drives,
    storage media, and Internet and local networks. The broad, sweeping “staleness” section,
    comprised of five paragraphs, emphasizes that digital data can often be forensically
    recovered “years after it [i]s written.”13
    Against the backdrop of this boilerplate language, which underscores technology’s
    capacity to preserve digital data for lengthy periods of time and the ability of forensic
    experts to recover it, the concluding paragraphs of the Affidavits recite the history and
    facts underlying the complaint (“Section D”). The concluding paragraphs of Section D
    refer to documents, e-mails, and “other electronically stored communications,” and state
    that cellular phones may contain evidence, including text messages and e-mails.
    Although the investigators had copies of the letters referenced above, the Affidavits state
    that “there may be evidence of written communications at the residence and the personal
    work place [sic] of the subject” and that “[w]ritten communications were sent to the
    13
    Section C also states that, “[w]ith the advent of larger capacity hard-drives, removable media,
    and CD/DVD burners over the past several years, the retention and therefore recovery of, data
    from digital media has greatly increased.” A25. With respect to DVDs and CDs, Section C
    observes that “[t]he data stored on them is highly stable and not usually subject to corruption
    barring physical damage to the media itself.” A25-26.
    9
    victims . . . .” The affiant averred that “evidence of this correspondence may be envelope
    [sic], letters, address books and handwritten notes.”
    Later on October 22, 2013, the Wilmington Police Department and the State of
    Delaware obtained the Witness Tampering Warrants.14
    Despite mention of written communications in the Affidavits, the Witness
    Tampering Warrants listed, under “ITEMS TO BE SEARCHED FOR AND SEIZED[,]”
    the following broad categories of items:
    2. Search the following location within the residence described herein the
    application and affidavit [sic] to include but not limited to: locked or unlocked
    safes, boxes, bags, compartments, storage areas or things in the nature thereof,
    found in or upon said residence that could be used to contain evidence[.]
    3. Any personal computer, computer system, device or component to include
    desktop(s), laptop(s), notebook(s), PDA(s), or tower style systems capable of
    storing, retrieving, and/or processing magnetic, digital or optical data and in
    particular any such devices capable of connecting to or communicating with
    the Internet or Internet Service Providers by any means including dial-up,
    broadband, or wireless services.
    4. Any digital or optical data storage device connected to, capable of being
    connected to, read by, or capable of being read by, any item described in
    paragraph 4, to include: internal or external hard drives (found within or
    without any item seized pursuant to paragraph 4), mass storage devices, pen
    drives, smart cards, compact disks(CD), compact disk – recordable (CD R) or
    re-writable (CD RW), floppy diskettes, DVD+/- R or RW, or any other such
    device that stores digital data optically, electronically, or magnetically.
    5. Any cellular telephone, to include the registry entries, call logs, pictures, video
    recordings[,] text messages, user names, buddy lists, screen names, telephone
    numbers, writings or other digital material as it relates to this investigation.
    14
    The Applications, with respect to the items to be searched for and seized, are substantially
    similar to the Witness Tampering Warrants. Compare A19, with A21-22. Compare A31, with
    A33-34.
    10
    6. Any digital camera, digital video camera, optical camera, optical video camera,
    cell phone, or other device capable of capturing and storing to any media,
    photographs or images and the associated media there from [sic].
    7. Any and all data, and the forensic examination thereof, stored by whatever
    means on any items seized pursuant to paragraphs 4, 5, and 6, as described
    above to include but not limited to: registry entries, pictures, images,
    temporary internet files, internet history files, chat logs, writings, passwords,
    user names, buddy names, screen names, email, connection logs, or other
    evidence.
    8. Any file, writing, log, artifact, paper, document, billing record or other
    instrument, stored electronically or in printed form, which relates to or
    references the owner of items seized pursuant to paragraphs [] 2, 3, 4, 5, 6, 7
    and 8, as described above.15
    After reviewing the Affidavits, a Superior Court judge (the “Issuing Judge”)
    determined that there was probable cause for a search and seizure of Wheeler’s property.
    The Witness Tampering Warrants were then issued.
    D.     The Search and Seizure
    During the evening of October 22, 2013, law enforcement officers executed the
    warrants for Wheeler’s home and office at Tower Hill.               The team seized several
    computers and other electronic devices, including: (1) two iMacs; (2) a Mac PowerBook
    G4; (3) two external hard drives; (4) two iPhones; (5) a Tungsten Palm; (6) an iPad; (7) a
    MacBook Pro; (8) 26 CDs; and (9) 23 DVDs.
    After the Witness Tampering Warrants were executed, Sergeant Kevin Perna of
    the Delaware State Police Department (“Sergeant Perna”)—a forensic examiner who, at
    the time, had performed nearly 500 forensic examinations and taught classes related to
    the subject at a local law school and the Delaware police academy—conducted a forensic
    15
    A19 (Warrant 1 ¶¶ 2-8) (emphasis added); A31 (Warrant 2 ¶¶ 2-8) (emphasis added).
    11
    search of the seized devices using EnCase. This was his first forensic examination using
    EnCase, a software program utilized by law enforcement to forensically examine
    computers and other electronics. Using this software, a forensic examiner can perform
    keyword searches, access files that a standard computer search would not uncover, and
    view “all the contents on [a] hard drive . . . .”16
    Despite orders from Chief Investigator Irwin that directed Sergeant Perna to
    search for “text-type” documents, Sergeant Perna’s forensic evaluation of Wheeler’s data
    captured “image files” and “video files.”17 Sergeant Perna acknowledged that video and
    image files were not implicated in the context of this case and were not subsumed within
    his “more restrictive” marching orders from Chief Investigator Irwin.18
    Sergeant Perna also acknowledged that the EnCase software enabled him to filter
    Wheeler’s data by limiting the search results to certain file extensions, such as .doc, .text,
    .pdf, which were among the items he was seeking, and that he could have removed image
    and movie video files. He testified as follows:
    Q.      . . . So had you put those kind of conditions [sic] in, it would have
    restricted the files that would have popped up and you would not have seen
    video or image files; correct?
    A.      Yes.19
    Instead of restricting his search, Sergeant Perna performed a review of the “folder
    structure” on the iMac, including the “Desktop” folder, which enabled him to review all
    16
    A185 (Tr. 14:3-6).
    17
    See A194 (Tr. 47:6-8).
    18
    A193 (Tr. 43:10-13); A194 (Tr. 47:16-23).
    19
    A194 (Tr. 48:10-14).
    12
    of Wheeler’s digital files. He stated that he prefers to “see all of the files, . . . [so that he
    can] find the ones that are pertinent and things that are not pertinent.”20 This cursory
    search of the files on the hard drive of the iMac occurred while Sergeant Perna ran a
    keyword search using the terms “witness intimidation” and “witness tampering.” During
    this cursory review, he found files that appeared to be video files. Because these files—
    labeled “GERBYS II” and “hippodrome boys large”—seemed suspicious, Sergeant Perna
    asked Detective Scott Garland (“Detective Garland”) if he was familiar with them.
    Detective Garland explained that these titles were related to child pornography.
    Based upon Sergeant Perna’s discovery of these two files, on October 29, 2013,
    the State obtained an additional search warrant from the Kent County Superior Court to
    search previously seized devices for child pornography (the “Child Pornography
    Warrant”).21 The Child Pornography Warrant authorized the search and seizure of digital
    devices the investigators already had in their custody.22 The State did not open the video
    files until it obtained the Child Pornography Warrant.23 After viewing the files, the State
    sought and obtained an indictment against Wheeler on charges of Dealing in Child
    Pornography under 
    11 Del. C
    . § 1109(4).
    E.      The Indictment
    20
    A197 (Tr. 62:19-21).
    21
    On October 23, 2013, a separate search warrant was obtained for Wheeler’s 2011 Chevrolet
    Tahoe. On October 25, 2013, the State also obtained a search warrant for Wheeler’s airplane.
    22
    The application for the Child Pornography Warrant contained a broad “catch-all” provision
    that was nearly identical to the catch-all provision in the Witness Tampering Warrants, all of
    which permitted the search, seizure, and forensic examination of “[a]ny and all data” on
    Wheeler’s devices.
    23
    Wheeler correctly maintains that, if his challenge to the Witness Tampering Warrants is
    successful, all evidence seized and recovered thereafter represents “fruit of the poisonous tree.”
    13
    On December 9, 2013, a Grand Jury returned an indictment against Wheeler. The
    indictment charged Wheeler with 25 counts of Dealing in Child Pornography in violation
    of 
    11 Del. C
    . § 1109(4). In relevant part, the statute provides:
    A person is guilty of dealing in child pornography when: . . . (4) The
    person, intentionally compiles, enters, accesses, transmits, receives,
    exchanges, disseminates, stores, makes, prints, reproduces or otherwise
    possesses any photograph, image, file, data or other visual depiction of a
    child engaging in a prohibited sexual act or in the simulation of such an
    act.24
    Of the 19 devices seized from Wheeler’s home and office, three contained images
    of child pornography. The indictment was based upon 25 images recovered from the
    newsgroup cache on Wheeler’s iMac. The iMac itself had not been turned on since
    September 29, 2012.25 Of the 25 images of child pornography, only one was cached after
    2009. Specifically, one image was cached on September 2, 2005, one image was cached
    on January 1, 2010, and the remaining images were cached between July and September
    2009.
    F.     The Motion to Suppress
    On May 5, 2014, Wheeler filed the Motion to Suppress. On May 23, 2014, the
    Superior Court held a hearing on the Motion to Suppress. The State presented the
    testimony of Sergeant Perna. Wheeler presented testimony from his expert witness, Tami
    L. Loehrs (“Loehrs”). Sergeant Perna testified that he was looking for evidence of
    witness tampering and witness intimidation, particularly in the form of “text-type”
    24
    
    11 Del. C
    . § 1109(4).
    25
    A245 (Tr. 49:5-10). As Sergeant Perna testified, the forensic significance of the date of last
    access merely signified the date on which the computer was last powered on, and it did not
    reflect that any newsgroup or newsreader was accessed on that date. A245 (Tr. 49:11-17).
    14
    documents. On cross-examination, he agreed that the Witness Tampering Warrants’ lists
    of items to be searched for and seized were “almost virtually identical to exactly the list
    [one] would see in a child pornography case.”           He also agreed that the Witness
    Tampering Warrants essentially had no limitations and that the warrants, on their face,
    were “wide open.”
    The Superior Court heard final arguments from the parties on the Motion to
    Suppress on July 11, 2014. The State, again, conceded that the substance of the Witness
    Tampering Warrants “could be viewed as a cut-and-paste from a [warrant related to]
    child porn[.]”26 Further, at oral argument before this Court, the State conceded that the
    Witness Tampering Warrants did not contain “anything particularized from the evidence
    that they were . . . searching.”27
    On September 18, 2014, the Superior Court issued its Opinion denying Wheeler’s
    Motion to Suppress.28 The Superior Court did not explicitly address the issue of whether
    the Witness Tampering Warrants were general warrants in violation of the Fourth
    Amendment to the United States Constitution, Article I, § 6 of the Delaware Constitution,
    and 
    11 Del. C
    . § 2307(a).
    G.   The Bench Trial
    26
    A230 (Tr. 34:16-19) (The Superior Court: “How do you address the issue that this could be
    viewed as a cut-and-paste from a child porn [warrant]?” Prosecutor: “Well, [Y]our Honor, I
    don’t -- the State concedes that.”).
    27
    Videotape: Oral Argument before the Delaware Supreme Court, at 43:35 (Christopher
    Wheeler v. State of Delaware, No. 205, 2015, Jan. 20, 2016), archived at
    http://livestream.com/accounts/5969852/events/4710274/videos/109946633/player?autoPlay=fal
    se&height=360&mute=false&width=640 [hereinafter, “Oral Argument at __”].
    28
    See generally State v. Wheeler, 
    2014 WL 4735126
    (Del. Super. Sept. 18, 2014) [hereinafter,
    “Wheeler I, 
    2014 WL 4735126
    , at __”].
    15
    On October 7, 2014, the Superior Court held a bench trial. The parties stipulated
    to the facts that Wheeler was the sole user of each of the seized devices and that each of
    the 25 images at issue constituted child pornography under Delaware law. Wheeler did
    not take the stand in his defense, and the sole witness at trial was Sergeant Perna.
    However, since becoming EnCase certified in 2013, Sergeant Perna had never performed
    a child pornography-related forensic examination before his evaluation of Wheeler’s
    digital universe.29
    At trial, it was undisputed that the charged images came to be on each of
    Wheeler’s devices through his subscription to newsgroups. Newsgroups are Internet
    discussion groups in which people exchange, browse, upload, and download files, which
    can be documents, photos, or videos. It was also undisputed that there is nothing illegal
    about newsgroups as a general matter, and that they exist on a variety of legitimate
    topics. Because the 25 indicted images were found in the newsgroup cache, the State
    agreed throughout the proceedings that this was not an Internet case.                Nor was an
    indictment obtained with respect to Wheeler’s Internet activity.
    Sergeant Perna testified that the 25 charged images were found in two newsgroups
    that Wheeler subscribed to: “alt.binaries.pictures.asparagus” and “alt.fan.air.”30
    However, Sergeant Perna acknowledged that there is no way to forensically determine
    whether a newsreader user has viewed any particular file. Accordingly, at oral argument
    29
    Sergeant Perna’s testimony in this case represented the first time that he had ever testified as
    an expert in a child pornography trial.
    30
    A240 (Tr. 29:8-31:6). Sergeant Perna found four newsgroups related to child pornography
    that Wheeler subscribed to on the PowerBook: “alt.binaries.pictures.asparagus,”
    “alt.fan.prettyboy,” “alt.fan.rdm,” and “alt.fan.snuffles.” 
    Id. at Tr.
    31:11-32:6.
    16
    before this Court, the State conceded that it could not conclusively prove that Wheeler
    ever viewed the 25 charged images at issue.31
    At trial, Sergeant Perna acknowledged that he had no expertise concerning
    newsgroups or newsreaders.32        He explained that information from newsgroups
    automatically caches on the subscriber’s computer, regardless of whether the user
    accesses that information.     But if Wheeler had downloaded the images of child
    pornography from the newsgroups, Sergeant Perna agreed that such images should have
    appeared somewhere other than the cache on Wheeler’s computer. Here, the 25 charged
    images appeared only in the cache. Accordingly, Sergeant Perna conceded that the
    government could not forensically establish that Wheeler ever viewed the 25 indicted
    images:
    Q.     Fair to say that the 25 charged images here found in the cache, you cannot
    forensically say whether or not they were ever viewed, correct, you can simply say
    they cached?
    A.     Cached.33
    *        *    *
    Q.    But it is possible that not only was the image never viewed, but the
    news[]group wasn’t even visited on those dates when they cached, correct?
    A.     Correct.34
    *        *    *
    31
    See Oral Argument at 52:20.
    32
    See A243 (Tr. 43:6-8) (Q. [Newsreaders are] not something that you had a lot of expertise
    about, correct? A. No, sir.).
    33
    A250 (Tr. 71:4-8).
    34
    A251 (Tr. 76:12-15).
    17
    Q.    And you cannot say that Mr. Wheeler actually opened up and viewed the
    news[]groups on the days in question?
    A.     No.
    Q.    And you cannot say that he ever viewed any of the images that he has been
    charged for, correct?
    A.     No.35
    *        *   *
    Q.     All you can tell is what news[]group the person has selected a box [sic],
    correct?
    A.     Yes.
    Q.    You can never know if they ever even viewed that particular news box,
    much less the contents within?
    A.     No.36
    Based upon such testimony, Wheeler argued that the State had not adequately proved that
    he possessed the indicted images because the State failed to establish that he even viewed
    the images.
    H.    The Motion for Judgment of Acquittal
    Between the close of evidence and closing arguments, Wheeler filed his Motion
    for Judgment of Acquittal. On December 22, 2014, the Superior Court denied Wheeler’s
    Motion for Judgment of Acquittal, finding Wheeler guilty of each of the 25 indicted
    counts of Dealing in Child Pornography. The trial court concluded that the evidence
    demonstrated that “Wheeler developed a pattern of Internet browsing for child
    35
    A252 (Tr. 80:7-13).
    36
    A253 (Tr. 82:22:-83:5).
    18
    pornography.”37 In part, the trial court reasoned that “[t]he sheer number of images . . .
    supports the reasonable inference that Mr. Wheeler intentionally, as opposed to
    inadvertently, possessed child pornography.”38
    On April 24, 2015, Wheeler was sentenced to 50 years at Level V. Two days
    later, on April 26, 2015, Wheeler filed his Notice of Appeal in this Court.
    I.      Proceedings Before this Court
    Wheeler appeals from the Superior Court’s denial of both of his motions, although
    he focuses primarily on the trial court’s denial of his Motion to Suppress. As to the
    Motion to Suppress, he contends that the Superior Court erred because: (1) the Affidavits
    failed to establish probable cause that he committed the alleged witness tampering
    crimes; (2) the State deliberately and recklessly omitted information from the Affidavits
    that was material to the Issuing Judge’s probable cause determination; (3) the Affidavits
    failed to establish the required nexus between evidence of witness tampering and the
    items to be searched for and seized; and (4) the Witness Tampering Warrants were
    unconstitutionally overbroad.
    37
    State v. Wheeler, 
    2014 WL 7474234
    , at *13 (Del. Super. Dec. 22, 2014) [hereinafter, “Wheeler
    II, 
    2014 WL 7474234
    , at __”]. Although the State filed no charges relating to 2,000 images of
    child pornography and 3,000 images of child erotica discovered across Wheeler’s digital
    universe, it argued that these images were evidence of Wheeler’s intentional possession, receipt,
    and compilation of the 25 charged images. Further, although the record is not entirely clear, the
    State contends that these images were downloaded from the Internet through the use of
    newsgroups. Ans. Br. 5. The trial court relied upon the 2,000 images of child pornography as
    evidence that Wheeler intentionally, as opposed to inadvertently, possessed the 25 charged
    images. Wheeler II, 
    2014 WL 7474234
    , at *13. Sergeant Perna found a program called
    “NetShred X” on certain of Wheeler’s devices. According to Sergeant Perna, NetShred X is a
    program that erases a user’s Internet activity from the computer’s hard drive. See A242 (Tr.
    37:10-14). Notably, the State agrees that this is not an Internet case.
    38
    Wheeler II, 
    2014 WL 7474234
    , at *13.
    19
    Because we conclude that the Witness Tampering Warrants are prohibited general
    warrants, we do not reach Wheeler’s assertion that no probable cause existed to issue the
    Witness Tampering Warrants. We briefly address it only insofar as it bears on the
    constitutional analysis and provides useful context.
    The witness tampering charges relate to three individuals: NK and two of the W
    brothers. As to NK, the Affidavits suggest that he never reported Wheeler’s sexual abuse
    to the police because “his father would pay him off.”39 But the State conceded during
    oral argument before this Court that there was likely no evidence of the witness
    tampering that allegedly occurred in Illinois present in Wheeler’s Delaware home or
    office: according to the State, the police were “not going to find anything regarding
    [NK], the son.”40
    That leaves the W brothers’ allegations as a possible basis for justifying the search
    and seizure of Wheeler’s property. As to the W brothers, the Affidavits establish that
    they initiated communication with Wheeler beginning in July 2013. But Sergeant Perna
    searched Wheeler’s iMac for evidence of witness tampering related to such
    communication, despite the fact that the iMac had not been powered on since September
    2012. Upon discovering that the iMac had last been turned on in 2012, Sergeant Perna
    39
    Wheeler argues that “the [A]ffidavits do not allege that any witness tampering of [NK]
    occurred in Delaware or within 5 years to satisfy [Delaware’s] statute of limitations.” Op. Br.
    20. The record evidence indicates that Wheeler’s alleged “pay offs” to NK occurred in Illinois,
    years before the underlying search. Specifically, the Affidavits suggest that this conduct
    occurred when Wheeler and NK lived in Illinois, but do not indicate whether NK provided the
    Bluffton Police with particular dates as to when the pay offs were made. Nor was any evidence
    presented to this Court showing that such payments were made.
    40
    Oral Argument at 40:25.
    20
    should have terminated his forensic examination of the device since it could not contain
    information from the relevant time frame.
    Further, Wheeler argues that none of the evidence presented creates a reasonable
    inference that he acted “knowingly and with malice.”41 In his July 20, 2013 letter to
    Wheeler, SW first raised the matter of restitution and Wheeler responded that he would
    wait to hear from SW “about further appropriate steps towards resolution and restitution.”
    Whether an offer of civil restitution forms a sufficient basis for witness tampering and
    intimidation charges—such that it establishes that the offeror acts knowingly and with
    malice in attempting to undermine any trial, proceeding, or inquiry—presents a question,
    where, as here, the offer of restitution is responsive to a request from the potential
    witness, is accompanied by an admission of guilt, and does not indicate an intention to
    prevent the potential witness from contacting law enforcement. We do not address these
    other important arguments, since we think it is clear that the challenged warrants were of
    a kind which it was the purpose of the Fourth Amendment to forbid—general warrants.
    Thus, even accepting for the sake of argument that the Witness Tampering Warrants were
    issued upon probable cause, the order denying the Motion to Suppress must be reversed.
    41
    See 
    11 Del. C
    . § 1263 (“A person is guilty of tampering with a witness when: . . . (3) The
    person knowingly intimidates a witness or victim under circumstances set forth in subchapter III
    of Chapter 35 of this title.”). A person is guilty of the Act of Intimidating a Witness when that
    person “knowingly and with malice attempts to prevent another person who has been the victim
    of a crime, or a witness to a crime (or any person acting on behalf of a victim or witness) from”
    engaging in certain enumerated acts related to the administration or enforcement of the law. See
    
    11 Del. C
    . § 3532.
    Wheeler also raises a reverse-Franks claim pursuant to the United States Supreme
    Court’s decision in Franks v. Delaware, 
    438 U.S. 154
    (1978). He contends that the State
    intentionally or recklessly omitted material information from the Affidavits. Because we find
    that the Witness Tampering Warrants are unconstitutionally general, we also need not reach this
    issue.
    21
    II.    ANALYSIS
    In assessing Wheeler’s challenge to the Witness Tampering Warrants on the
    grounds that they violated the Fourth Amendment to the United States Constitution and
    Article I, § 6 of the Delaware Constitution, we review such alleged constitutional
    violations de novo.42      We also apply de novo review to the Superior Court’s legal
    conclusions when reviewing the denial of a motion to suppress.43 “We review the
    Superior Court’s factual findings to determine ‘whether there was sufficient evidence to
    support the findings and whether those findings were clearly erroneous.’”44
    A.    The Fourth Amendment to the United States Constitution, Article I, § 6 of the
    Delaware Constitution, and 
    11 Del. C
    . § 2307(a)
    The Fourth Amendment to the United States Constitution provides: “The right of
    the people to be secure in their persons, houses, papers, and effects, against unreasonable
    searches and seizures, shall not be violated, and no Warrants shall issue, but upon
    probable cause, supported by Oath or affirmation, and particularly describing the place to
    be searched, and the persons or things to be seized.”45 The United States Supreme Court
    has observed that “the ultimate touchstone of the Fourth Amendment is
    ‘reasonableness[.]’”46
    Similarly, Article I, § 6 of the Delaware Constitution provides: “The people shall
    be secure in their persons, houses, papers and possessions, from unreasonable searches
    42
    Bradley v. State, 
    51 A.3d 423
    , 433 (Del. 2012) (citing Swan v. State, 
    28 A.3d 362
    , 382 (Del.
    2011); LeGrande v. State, 
    947 A.2d 1103
    , 1107 (Del. 2008)).
    43
    
    Id. (citing Lopez-Vazquez
    v. State, 
    956 A.2d 1280
    , 1284-85 (Del. 2008)).
    44
    
    Id. (quoting Lopez-Vazquez,
    956 A.2d at 1285).
    45
    U.S. Const. amend. IV.
    46
    Brigham City v. Stuart, 
    547 U.S. 398
    , 403 (2006) (citations omitted).
    22
    and seizures; and no warrant to search any place, or to seize any person or thing, shall
    issue without describing them as particularly as may be; nor then, unless there be
    probable cause supported by oath or affirmation.”47             In addition to the Delaware
    Constitution, 
    11 Del. C
    . § 2307(a), in part, provides: “The warrant shall designate the
    house, place, conveyance or person to be searched, and shall describe the things or
    persons sought as particularly as possible.”48
    1.      Our Founding Fathers Rejected “General Warrants”
    Our nation’s constitutional history and jurisprudence reflects a long-standing
    hostility towards general warrants.           General warrants, when employed by the
    government, afford officials “blanket authority” to indiscriminately search persons,
    houses, papers, and effects.49 The United States Supreme Court has characterized “the
    specific evil” of the general warrant abhorred by the colonists as “a general, exploratory
    rummaging in a person’s belongings.”50 By contrast, a warrant that is simply overly
    47
    Del. Const. art. I, § 6.
    48
    
    11 Del. C
    . § 2307(a) (emphasis added).
    49
    Stanford v. Texas, 
    379 U.S. 476
    , 481 (1965); see also United States v. Tracey, 
    597 F.3d 140
    ,
    154 (3d Cir. 2010) (“Examples of general warrants are those authorizing searches for and
    seizures of such vague categories of items as ‘smuggled goods,’ ‘obscene materials,’ ‘books,
    records, pamphlets, cards, receipts, lists, memoranda, pictures, recordings and other written
    instruments . . .,’ ‘illegally obtained films,’ and ‘stolen property.’”) (internal quotation marks
    omitted) (citation omitted).
    50
    Coolidge v. New Hampshire, 
    403 U.S. 443
    , 467 (1971) (citing Boyd v. United States, 
    116 U.S. 616
    , 624-30 (1886); Marron v. United States, 
    275 U.S. 192
    , 195-96 (1927); Stanford, 
    379 U.S. 476
    ).
    23
    broad “‘describe[s] in both specific and inclusive generic terms what is to be seized,’ but
    it authorizes the seizure of items as to which there is no probable cause.”51
    The aversion to general warrants stems from the founding generation’s pre-
    revolutionary experiences with England.52 As early as 1685, the English Parliament
    objected to the Crown’s use of broad searches to limit freedom of the press.53 In 1765, an
    English court denounced this practice in the well-known Entick v. Carrington54 case,
    where a London publisher successfully sued for trespass after his home was searched
    pursuant to a general warrant.55
    During the colonial era, the English issued writs of assistance upon mere suspicion
    and gave customs officials blanket authority to search where they pleased for smuggled
    goods and evidence of libel in the homes of colonists.56 In 1761, a group of Boston
    merchants, represented by James Otis, Jr., unsuccessfully contested the issuance of new
    51
    United States v. Ninety-Two Thousand Four Hundred Twenty-Two Dollars & Fifty-Seven
    Cents ($92,422.57), 
    307 F.3d 137
    , 149 (3d Cir. 2002) (Alito, J.) (alteration in original) (quoting
    United States v. Christine, 
    687 F.2d 749
    , 753-54 (3d Cir. 1982)).
    52
    The roots of this aversion are far more extensive. It stems from “a struggle against oppression
    which had endured for centuries.” 
    Stanford, 379 U.S. at 482
    (“[I]t would be a needless exercise
    in pedantry to review again the detailed history of the use of general warrants as instruments of
    oppression from the time of the Tudors, through the Star Chamber, the Long Parliament, the
    Restoration, and beyond.”).
    53
    1 WAYNE R. LAFAVE, SEARCH & SEIZURE § 1.1(a) (5th ed.) (citing F. SIEBERT, FREEDOM OF
    THE PRESS IN ENGLAND: 1476-1776 48, 84-85, 173-76 (1952); N. LASSON, THE HISTORY AND
    DEVELOPMENT OF THE FOURTH AMENDMENT TO THE UNITED STATES CONSTITUTION 38–39
    (1937) (noting that Parliament recognized “the idea that general warrants were an arbitrary
    exercise of governmental authority against which the public had a right to be safeguarded”)).
    54
    19 Howell’s St. Tr. 1029 (1765).
    55
    See 
    Boyd, 116 U.S. at 625-26
    (discussing Carrington and a similar case, Wilkes v. Wood);
    LAFAVE, § 1.1(a) (citing Carrington, 19 Howell’s St. Tr. 1029).
    56
    
    Boyd, 116 U.S. at 625-26
    (noting the English government’s practice of “searching private
    houses for the discovery and seizure of books and papers that might be used to convict their
    owner of the charge of libel”).
    24
    writs.57 John Adams witnessed Otis’s arguments at the Old State House in Boston.58 As
    Adams later reported, the crowd departed “ready to take arms against writs of assistance.
    . . . Then and there the Child Independence was born.”59 The United States Supreme
    Court has characterized Otis’s denunciation of the Crown’s search power as “perhaps the
    most prominent event which inaugurated the resistance of the colonies to the oppressions
    of the mother country.”60
    The Fourth Amendment “‘grew directly out of the events which immediately
    preceded the revolutionary struggle with England.’”61 Its passage “was the founding
    generation’s response to the reviled ‘general warrants’ and ‘writs of assistance’ of the
    colonial era, which allowed British officers to rummage through homes in an
    unrestrained search for evidence of criminal activity.”62 Indeed, initial efforts at crafting
    a Federal Constitution met strong opposition due, in part, to the drafters’ failure to
    impose limits on the government’s power to search.63 These objections ultimately led to
    the inclusion of the Fourth Amendment in the Federal Bill of Rights.64
    57
    LAFAVE, § 1.1(a).
    58
    
    Id. 59 Id.
    (quoting 10 C. ADAMS, THE LIFE AND WORKS OF JOHN ADAMS 247–48 (1856)) (alteration
    in original) (internal quotation marks omitted).
    60
    
    Boyd, 116 U.S. at 625
    .
    61
    LAFAVE, § 1.1(a) (quoting J. LANDYNSKI, SEARCH AND SEIZURE AND THE SUPREME COURT 19
    (1966)).
    62
    Riley v. California, 
    134 S. Ct. 2473
    , 2494 (2014).
    63
    LAFAVE, § 1.1(a) (citing LASSON, at 92–96).
    64
    Cf. Mason v. State, 
    534 A.2d 242
    , 246-47 n.10 (Del. 1987) (“The amendment in the Bill of
    Rights concerning searches and seizure was framed and adopted with the fresh recollection of the
    debates on writs of assistance and the Revolution which followed.”) (citing Davis v. United
    States, 
    328 U.S. 582
    , 605 (1946) (Frankfurter, J., dissenting)); 
    id. at 246
    (“The Framers were
    aware of the attempts that had been made by representatives of the King of England, both in
    25
    2.      Delaware’s Search and Seizure Protections
    The search and seizure protections in the Delaware Constitution preceded the
    adoption of the Fourth Amendment.65 In 1776, Delaware adopted its own constitutional
    protections against general warrants66 and embraced the first search and seize safeguards
    for its citizens.67 The Declaration of Rights and Fundamental Rules of the Delaware
    State provided:
    Sect. 17. That all warrants without oath to search suspected places, or to
    seize any person or his property, are grievous and oppressive; and all
    general warrants to search suspected places, or to apprehend all persons
    suspected, without naming or describing the place or any person in special,
    are illegal and ought not to be granted.68
    This provision was the antecedent to the provision now found in Article I, § 6 of the
    present Delaware Constitution.
    On January 28, 1790, Delaware ratified the Bill of Rights to the United States
    Constitution.69 But when Delaware subsequently adopted a new State Constitution in
    1792, it closely tracked the language of the Pennsylvania Constitution of 1790.70 In
    previous cases, this Court has held that our Constitution affords our citizens protections
    England and in the American colonies, to exceed laws which confined governmental powers to
    search.”).
    65
    
    Id. at 247
    (“Delaware’s protections against unreasonable searches and seizures predate those
    which are provided for in the Fourth Amendment.”); see also Jones v. State, 
    745 A.2d 856
    , 865
    (Del. 1999).
    66
    See Dorsey v. State, 
    761 A.2d 807
    , 815-16 (Del. 2000).
    67
    See 
    Jones, 745 A.2d at 865
    .
    68
    
    Id. 69 Id.
    (citation omitted).
    70
    
    Id. at 865-66.
                                                  26
    somewhat greater than those of the Fourth Amendment.71 Here, the challenged Witness
    Tampering Warrants violate both the United States and Delaware Constitutions.
    The warrant requirement addresses the Framers’ concerns in two ways. “First, the
    magistrate’s scrutiny is intended to eliminate altogether searches not based on probable
    cause.”72 Second, the warrant requirement ensures that “those searches deemed necessary
    [are] as limited as possible[,]” as the evil of unrestrained searches “is not that of intrusion
    per se, but of a general, exploratory rummaging in a person’s belongings.”73
    The second objective is achieved by enforcing the particularity requirement of the
    Fourth Amendment. The warrant must describe the things to be searched with sufficient
    particularity and be no broader than the probable cause on which it is based.74 “The
    manifest purpose of this particularity requirement [i]s to prevent general searches. By
    limiting the authorization to search to the specific areas and things for which there is
    probable cause to search, the requirement ensures that the search will be carefully tailored
    71
    For instance, we note three cases in which this Court held that our State Constitution provides
    somewhat broader constitutional protections. First, despite observing that the language of the
    Fourth Amendment and Article I, § 6 is “nearly identical,” we have held that “the Delaware
    Constitution provides a greater protection for the individual than the United States Constitution
    in the determination of whether a seizure by the State has occurred.” Flonnory v. State, 
    805 A.2d 854
    , 857 (Del. 2001) (citing 
    Jones, 745 A.2d at 863-64
    ). Second, in Dorsey v. State, this
    Court held that the “good faith” exception to the exclusionary rule did not apply in Delaware
    because “exclusion is the constitutional remedy for a violation of the search and seizure
    protections set forth in Article I[,] Section 6 of the Delaware Constitution.” 
    Dorsey, 761 A.2d at 821
    (citing 
    Jones, 745 A.2d at 873-74
    ) (citation omitted). Third, for more than 150 years, “a
    Delaware statute has required more than probable cause for the issuance of a nighttime search
    warrant.” 
    Id. at 819
    (citing 
    Mason, 534 A.2d at 248
    ) (emphasis in original).
    72
    
    Coolidge, 403 U.S. at 467
    (emphasis added).
    73
    
    Id. (citing Boyd,
    116 U.S. at 624-30; 
    Marron, 275 U.S. at 195-96
    ; Stanford, 
    379 U.S. 476
    ).
    74
    United States v. Zimmerman, 
    277 F.3d 426
    , 432 (3d Cir. 2002) (citation omitted).
    27
    to its justifications, and will not take on the character of the wide-ranging exploratory
    searches the Framers intended to prohibit.”75
    B.      The Particularity Requirement Presents Difficult Challenges in the Context of
    Computer Searches
    Warrants directed to digital information present unique challenges in satisfying the
    particularity requirement, given the unprecedented volume of private information stored
    on devices containing such data.76 The expansive universe of digital and electronic
    information, and the intermingling data, complicates balancing the privacy interests of
    our citizens and the legitimate efforts of law enforcement in investigating criminal
    activity.77
    The United States Supreme Court, in Riley v. California,78 recognized the
    enormous potential for privacy violations flowing from unconstrained searches of cell
    phones.79 The Riley Court, in considering a warrantless search of a cell phone, observed
    that, much like a computer search, “[a cell] phone not only contains in digital form many
    
    75 Md. v
    . Garrison, 
    480 U.S. 79
    , 84 (1987) (citations omitted); see also Arizona v. Gant,
    
    556 U.S. 332
    , 345 (2009) (“[T]he central concern underlying the Fourth Amendment [is] the
    concern about giving police officers unbridled discretion to rummage at will among a person’s
    private effects.”) (citations omitted).
    76
    See 
    Riley, 134 S. Ct. at 2494-95
    (“Modern cell phones are not just another technological
    convenience. With all they contain and all they may reveal, they hold for many Americans ‘the
    privacies of life[.]’”) (quoting 
    Boyd, 116 U.S. at 630
    ).
    77
    Cf. Kyllo v. United States, 
    533 U.S. 27
    , 33-34 (2001) (Scalia, J.) (“It would be foolish to
    contend that the degree of privacy secured to citizens by the Fourth Amendment has been
    entirely unaffected by the advance of technology.”).
    78
    
    134 S. Ct. 2473
    (2014).
    79
    See 
    id. at 2489
    (“Cell phones differ in both a quantitative and a qualitative sense from other
    objects that might be kept on an arrestee’s person. The term ‘cell phone’ is itself misleading
    shorthand; many of these devices are in fact minicomputers that also happen to have the capacity
    to be used as a telephone. They could just as easily be called cameras, video players, rolodexes,
    calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.”).
    28
    sensitive records previously found in the home; it also contains a broad array of private
    information never found in a home in any form . . . .”80              As the Supreme Court
    acknowledged in Riley, digital searches permit the government access to “far more than
    the most exhaustive search of a house . . . .”81
    The United States Constitution “specifies only two matters that must be
    ‘particularly describ[ed]’ in the warrant: ‘the place to be searched’ and ‘the persons or
    things to be seized.’”82     Satisfying the particularity requirement is difficult in the
    electronic search warrant context, given the commingling of relevant and irrelevant
    information and the complexities of segregating responsive files ex ante. As the United
    States Court of Appeals for the Third Circuit observed, “it would be ‘folly for a search
    warrant to structure the mechanics of the search’ because ‘imposing such limits would
    unduly restrict legitimate search objectives . . . .’”83 Nonetheless, in an oft-quoted
    passage of Marron v. United States,84 the United States Supreme Court observed that
    “[t]he requirement that warrants shall particularly describe the things to be seized makes
    general searches under them impossible and prevents the seizure of one thing under a
    warrant describing another. As to what is to be taken, nothing is left to the discretion of
    the officer executing the warrant.”85 Accordingly, the United States Supreme Court has
    80
    
    Id. at 2491.
    81
    
    Id. (emphasis in
    original).
    82
    United States v. Grubbs, 
    547 U.S. 90
    , 97 (2006) (alteration in original).
    83
    United States v. Stabile, 
    633 F.3d 219
    , 238 (3d Cir. 2011) (quoting United States v. Burgess,
    
    576 F.3d 1078
    , 1094 (10th Cir. 2009), cert. denied, 
    558 U.S. 1097
    (2009)), cert. denied, 132 S.
    Ct. 399 (2011).
    84
    
    275 U.S. 192
    (1927).
    85
    
    Id. at 196.
                                                  29
    suggested that warrants that fail to describe the specific crime that has been or is being
    committed do not satisfy the particularity requirement.86
    Warrants “must be tested by courts in a commonsense and realistic fashion,” and
    reviewing courts should avoid a “hypertechnical approach.”87 The majority of Federal
    Courts of Appeals have rejected the suggestion of requiring specific computer search
    protocols. For example, in United States v. Richards,88 the Court of Appeals for the Sixth
    Circuit observed that:
    [G]iven the unique problem encountered in computer searches, and the
    practical difficulties inherent in implementing universal search
    methodologies, the majority of federal courts have eschewed the use of a
    specific search protocol and, instead, have employed the Fourth
    Amendment’s bedrock principle of reasonableness on a case-by-case basis:
    While officers must be clear as to what it is they are seeking on the
    computer and conduct the search in a way that avoids searching files of
    types not identified in the warrant, . . . a computer search may be as
    extensive as reasonably required to locate the items described in the warrant
    based on probable cause.89
    86
    See, e.g., Berger v. New York, 
    388 U.S. 41
    , 55-56 (1967) (“The Fourth Amendment commands
    that a warrant issue not only upon probable cause supported by oath or affirmation, but also
    ‘particularly describing the place to be searched, and the persons or things to be seized.’ [The
    scrutinized] statute lacks this particularization. . . . It lays down no requirement for particularity
    in the warrant as to what specific crime has been or is being committed, nor ‘the place to be
    searched,’ or ‘the persons or things to be seized’ as specifically required by the Fourth
    Amendment.”). Here, while the Applications and Affidavits refer to the crimes alleged, the
    Witness Tampering Warrants do not.
    87
    
    Christine, 687 F.2d at 760
    (citations omitted) (internal quotation marks omitted).
    88
    
    659 F.3d 527
    (6th Cir. 2011), cert. denied, 
    132 S. Ct. 2726
    (2012).
    89
    
    Id. at 538
    (citations omitted) (internal quotation marks omitted). But see In re Search
    Warrant, 
    71 A.3d 1158
    (Vt. 2012) (drawing from the guidelines set forth in United States v.
    Comprehensive Drug Testing, Inc. (CDT I), 
    579 F.3d 989
    (9th Cir. 2009) and the concurring
    Opinion in United States v. Comprehensive Drug Testing, Inc. (CDT II), 
    621 F.3d 1162
    (9th Cir.
    2010) (en Banc) (per curiam) (Kozinski, C.J., concurring) regarding imposing ex ante limitations
    on computer searches)), cert. denied, 
    133 S. Ct. 2391
    (2013).
    30
    Some irrelevant files may have to be at least cursorily perused to determine whether they
    are within the authorized search ambit. Accordingly, the proper metric of sufficient
    specificity is whether it was reasonable to provide a more specific description of the
    items at that juncture of the investigation.90
    Further, the propensity of criminals to disguise files must be balanced against the
    competing interest of avoiding unrestrained general searches: “It is unrealistic to expect
    a warrant to prospectively restrict the scope of a search by directory, filename or
    extension or to attempt to structure search methods—that process must remain
    dynamic.”91 “[I]t is clear that because criminals can—and often do—hide, mislabel, or
    manipulate files to conceal criminal activity, a broad, expansive search of the hard drive
    may be required.”92 Consequently, it would likely unduly restrict law enforcement to
    require the crafting of specific keyword searches or identification of file names and
    extensions ex ante. In some instances, the technological reality may be that, “in the end,
    there may be no practical substitute for actually looking in many (perhaps all) folders and
    sometimes at the documents contained within those folders, and that is true whether the
    90
    See, e.g., 
    Christine, 687 F.2d at 760
    (“[T]he use of generic classifications in a warrant is
    acceptable when a more precise description is not feasible.”) (citations omitted).
    91
    
    Burgess, 576 F.3d at 1093
    (“While file or directory names may sometimes alert one to the
    contents . . ., illegal activity may not be advertised even in the privacy of one’s personal
    computer—it could well be coded or otherwise disguised.” (footnote omitted)).
    92
    
    Stabile, 633 F.3d at 237
    (citing 
    Burgess, 576 F.3d at 1092-94
    ).
    31
    search is of computer files or physical files.”93 “[N]o tenet of the Fourth Amendment
    prohibits a search merely because it cannot be performed with surgical precision.”94
    This Court has addressed Fourth Amendment challenges in the digital context on
    two occasions. But in neither case did we confront directly a challenge that a warrant
    seeking digital information failed to satisfy the particularity requirement in the United
    States and Delaware Constitutions.
    In the more recent of the cases, Bradley v. State,95 we considered whether the
    search exceeded the scope of the warrants, but not whether the warrants were
    unconstitutionally general. Bradley argued, among other things, that the police exceeded
    the scope of the warrant in executing the instrument and that the supporting affidavit
    failed to establish probable cause that patient files would be found in digital format. This
    Court concluded that “the computers and digital storage devices could reasonably contain
    the patient files described in the warrant, whether in text or image form.”96 Thus, in
    Bradley, there was no basis for segregating text files from other types of files because
    probable cause allowed for the search of both.
    Likewise, in the earlier case of Fink v. State,97 the State obtained a warrant to
    search the residence and automobile of the defendant, who was an attorney, for “client
    files including but not limited to” specifically listed clients and the personal banking
    93
    
    Burgess, 576 F.3d at 1094
    ; see also Ninety-Two 
    Thousand, 307 F.3d at 150
    (suggesting that, in
    some instances, it may be “necessary to search for and seize all” files when executing a search
    warrant).
    94
    
    Christine, 687 F.2d at 760
    .
    95
    
    51 A.3d 423
    (Del. 2012).
    96
    
    Id. at 435.
    97
    
    817 A.2d 781
    (Del. 2003).
    32
    records of the defendant. During the execution of the third of three search warrants, the
    police recovered a computer compact disk and three zip disks, each of which contained
    child pornography. The defendant argued that the warrant lacked sufficient particularity
    and that the words, “client files including but not limited to,” were overly broad and
    failed to adequately limit the search to those items for which probable cause had been
    established. This Court rejected the overbreadth claim, since the defendant’s financial
    dealings at issue “effectively opened all his financial records to potential scrutiny by the
    police.”98    Accordingly, we held that “the warrant’s authorized search did not
    unreasonably exceed a logical scope of inquiry.”99 However, this Court did not more
    directly address the permissible scope of warrants seeking digital information.100
    Thus, we consider more directly, for the first time, a challenge to warrants seeking
    to seize and search computer-based and digital items on the grounds that they are in the
    nature of a general warrant, unconstitutionally overbroad, and lack sufficient
    particularity. We have considered how other courts have addressed similar claims. In
    98
    
    Id. at 787.
    99
    Id.; see also United States v. Am. Investors of Pittsburgh, Inc., 
    879 F.2d 1087
    , 1105-06 (3d
    Cir. 1989) (“The fact that the warrant authorized a search for a large amount of documents and
    records does not necessarily render the search invalid so long as there exists a sufficient nexus
    between the evidence to be seized and the alleged offenses.”).
    100
    In Starkey v. State, 
    2013 WL 4858988
    (Del. Sept. 10, 2013), this Court addressed a claim that
    the search warrants at issue were overbroad, ambiguous, and failed to provide the relevance of
    the defendant’s “cell phone files” to the alleged crimes. This Court rejected the claim that the
    warrants were vague since “they specifically limited the officer’s search of the cell phones to
    certain types of data, media, and files that were ‘pertinent to th[e] investigation.’” 
    Id. at *4.
    We
    held that “[t]his language effectively limited the scope of the warrants, and prevented a
    boundless search of the cell phones.” 
    Id. (citing Fink,
    817 A.2d at 786).
    33
    United States v. Riccardi,101 for example, the United States Court of Appeals for the
    Tenth Circuit considered whether a warrant to seize and examine a defendant’s computer
    failed to satisfy the Fourth Amendment’s particularity requirement. There, the defendant
    was convicted of two counts of possession of child pornography and two counts of use of
    an instrumentality of interstate commerce to entice a minor to engage in a prohibited sex
    act.
    The Tenth Circuit held that the challenged warrant failed to satisfy the Fourth
    Amendment’s particularity requirement. It stated that the warrant “was not limited to any
    particular files, or to any particular federal crime. The warrant authorized the ‘seizure’ of
    [the defendant’s] computer”
    and all electronic and magnetic media stored therein, together with all
    storage devises [sic], internal or external to the computer or computer
    system, including but not limited to floppy disks, diskettes, hard disks,
    magnetic tapes, removable media drives, optical media such as CD–ROM,
    printers, modems, and any other electronic or magnetic devises [sic] used
    as a peripheral to the computer or computer system, and all electronic
    media stored within such devises [sic].102
    The Tenth Circuit observed that, “[b]y its terms, the warrant thus permitted the officers to
    search for anything—from child pornography to tax returns to private correspondence. It
    seemed to authorize precisely the kind of ‘wide-ranging exploratory search[] that the
    Framers intended to prohibit.’”103 Ultimately, however, the Tenth Circuit affirmed the
    101
    
    405 F.3d 852
    (10th Cir. 2005), cert. denied, 
    546 U.S. 919
    (2005), petition for reh’g denied,
    
    546 U.S. 1083
    (2005); see also United States v. Galpin, 
    720 F.3d 436
    , 448 (2d Cir. 2013)
    (finding that an electronic search warrant related to a registration offense was facially overbroad,
    in part, because it “authorized a search for images depicting child sexual activity”).
    102
    
    Riccardi, 405 F.3d at 862
    .
    103
    
    Id. at 863
    (quoting 
    Garrison, 480 U.S. at 84
    ).
    34
    trial court’s decision that the evidence seized pursuant to the invalid warrant need not be
    suppressed, on the basis of the good faith exception to the exclusionary rule.104
    Recently, in State v. Castagnola,105 the Supreme Court of Ohio considered the
    application of the particularity requirement of the Fourth Amendment to the search of a
    computer. There, the initial search warrant related to the crimes of retaliation, criminal
    trespassing, criminal damaging, and possession of criminal tools.106 The warrant sought
    the following:
    Records and documents either stored on computers, ledgers, or any other
    electronic recording device to include hard drives and external portable
    hard drives, cell phones, printers, storage devices of any kind, printed out
    copies of text messages or emails, cameras, video recorders or any photo
    imaging devices and their storage media to include tapes, compact discs, or
    flash drives.107
    Looking for “evidence of intimidation” on the defendant’s computer, the forensic
    examiner used a software program that “go[es] through documents, images, videos on the
    hard drive.”108 The examiner also performed a keyword search that did not yield any
    responsive results, before proceeding to open a tab that maintained “all the images
    associated with the drive being examined.”109 After accessing the tab, the examiner
    discovered images that she thought were child pornography, stopped her investigation,
    and applied for another warrant.     When performing a search based on the second search
    104
    
    Id. at 863
    -64.
    105
    
    2015 WL 1934723
    (Ohio Apr. 28, 2015).
    106
    
    Id. at *2.
    The forensic examiner in Castagnola testified that the defendant’s computer “was
    brought in for [a case involving] menacing, threatening, and intimidation.” 
    Id. at *3
    (alteration
    in original).
    107
    
    Id. at *16.
    108
    
    Id. at *3
    (internal quotation marks omitted) (alteration in original).
    109
    
    Id. (internal quotation
    marks omitted).
    35
    warrant, the forensic examiner discovered “over a thousand videos and images of
    suspected child pornography.”110
    In considering the defendant’s motion to suppress,111 the Supreme Court of Ohio
    scrutinized the instrument’s grant of authority to search and seize “[r]ecords and
    documents . . . stored on computers,” finding that its plain language “demonstrate[d] that
    there [wa]s no limitation on what records and documents were to be searched for in [the
    defendant’s] computer.”112 The court held that the challenged search warrant failed to
    satisfy the particularity requirement for two reasons. First, “the language of the search
    warrant did not ‘guide and control’ [the forensic examiner’s] judgment as to what was to
    be seized on the computer[,]” leaving the determination as to what to seize within the
    discretion of the examiner.113 Second, “the broad language of th[e] search warrant clearly
    included items that were not subject to seizure[,]” such that the instrument was not as
    specific as “the circumstances and the nature of the activity under investigation permitted
    . . . .”114
    The Ohio Supreme Court rejected the idea that the Fourth Amendment required a
    search warrant to specify restrictive search protocols. But it also recognized “that the
    Fourth Amendment does prohibit a ‘sweeping comprehensive search of a computer’s
    110
    
    Id. 111 Notably,
    Castagnola involved a single warrant that was first used to search the defendant’s
    house in order to seize the computers. 
    Id. at *15.
    The warrant was obtained a second time to
    search the contents of the defendant’s computers for evidence relating to child pornography. 
    Id. at *3
    .
    112
    
    Id. at *16.
    113
    
    Id. at *17.
    114
    
    Id. (citing Guest
    v. Leis, 
    255 F.3d 325
    , 336 (6th Cir. 2001)).
    36
    hard drive.’”115 The guiding metric applied by the court was that “officers must describe
    what they believe will be found on a computer with as much specificity as possible under
    the circumstances[,]” and that “[t]his will enable the searcher to narrow his or her search
    to only the items to be seized.”116 With this guidance, we turn to the warrants at issue
    here.
    C.      The Witness Tampering Warrants Were General Warrants and Violated the
    Particularity Requirement
    1.       The Witness Tampering Warrants Have No Temporal Limitations, Despite
    Relevant Dates Being Available to the Police
    A key principle distilled from the jurisprudence in this area is that warrants, in
    order to satisfy the particularity requirement, must describe what investigating officers
    believe will be found on electronic devices with as much specificity as possible under the
    circumstances. That principle simply was not followed here in several respects. One
    obvious respect was the failure to limit the search to the relevant time frame. Federal
    Courts of Appeals have concluded that warrants lacking temporal constraints, where
    relevant dates are available to the police, are insufficiently particular.117 Our sister courts
    115
    
    Id. at *18
    (citation omitted).
    116
    
    Id. 117 See,
    e.g., United States v. Abboud, 
    438 F.3d 554
    , 576 (6th Cir. 2006) (citation omitted)
    (stating that a warrant was overbroad because it “[f]ail[ed] to limit broad descriptive terms by
    relevant dates, when such dates [were] available to the police”); United States v. Ford, 
    184 F.3d 566
    , 576 (6th Cir. 1999) (citations omitted) (“Failure to limit broad descriptive terms by relevant
    dates, when such dates are available to the police, will render a warrant overbroad.”), cert.
    denied, 
    528 U.S. 1161
    (2000); United States v. Kow, 
    58 F.3d 423
    , 427 (9th Cir. 1995)
    (admonishing the government for failing to “limit the scope of the seizure to a time frame within
    which the suspected criminal activity took place, even though . . . [the supporting] affidavit
    indicate[d] that the alleged criminal activity began” at a specified point in time). Cf. United
    States v. Karrer, 460 F. App’x 157, 161 (3d Cir. 2012) (citing United States v. Yusuf, 
    461 F.3d 374
    , 395 (3d Cir. 2006)) (concluding that a warrant was not a general warrant, as it “sufficiently
    37
    have similarly considered temporal restrictions in the context of the particularity
    requirement.118 Ultimately, “[i]t is settled law that generic classifications in a warrant are
    acceptable only when a more precise description is not possible.”119
    We hesitate to prescribe rigid rules and instead reiterate that warrants must
    designate the things to be searched and seized as particularly as possible. Striking the
    correct balance when protecting against generality and overbreadth requires vigilance on
    the part of judicial officers who are on the front lines of preserving constitutional rights
    while assisting government officials in the legitimate pursuit of prosecuting criminal
    activity.   Where, as here, the investigators had available to them a more precise
    description of the alleged criminal activity that is the subject of the warrant, such
    information should be included in the instrument and the search and seizure should be
    identified a time period during which the suspected offenses occurred”). But compare Ninety-
    Two 
    Thousand, 307 F.3d at 151
    (Alito, J.) (“At most, the lack of time restrictions meant that the
    warrant was overly broad, not general. . . . In any event, the absence from the warrant of a
    provision limiting the search and seizure to documents pertaining to the time period of the
    scheme did not make the warrant ‘so facially deficient’ ‘as to render official belief in its
    [legality] entirely unreasonable.’”) (internal citation omitted) (alteration in original), with 
    id. at 156
    (Ambro, J., dissenting) (arguing that failure to limit the temporal scope of a warrant, when
    relevant dates are available to the police, is a “deficiency” that underlies an “unconstitutionally
    broad warrant”) (citing 
    Ford, 184 F.3d at 576
    ).
    118
    See, e.g., In re Search 
    Warrant, 71 A.3d at 1183-84
    (observing that a magistrate may properly
    restrict law enforcement’s search to items that meet certain parameters based on, inter alia, dates
    and “the known details of the suspected crime such as the time-period”); Commonwealth v.
    McDermott, 
    864 N.E.2d 471
    , 487 (Mass. 2007) (rejecting an argument that a warrant was
    overbroad where the challenged category of items was limited both in time frame and in the
    nature of the items that could be seized), cert. denied, 
    552 U.S. 910
    (2007).
    119
    United States v. Bright, 
    630 F.2d 804
    , 812 (5th Cir. 1980) (citing James v. United States, 
    416 F.2d 467
    , 473 (5th Cir. 1969), cert. denied, 
    397 U.S. 907
    (1970)).
    38
    appropriately narrowed to the relevant time period so as to mitigate the potential for
    unconstitutional exploratory rummaging.120
    The State conceded that nothing relating to NK would be found on Wheeler’s
    property identified in the Witness Tampering Warrants. And the Affidavits do not
    suggest otherwise. As to the only other potential victims, the W brothers, the Affidavits
    indicate that the alleged witness tampering occurred, if it did, in or after July 2013, since
    that was when the W brothers renewed contact with Wheeler.121 The Affidavits contain
    no facts suggesting that any tampering might have occurred prior to July 2013. Yet, the
    Witness Tampering Warrants were boundless as to time. Sergeant Perna testified that
    one of the first things he did in executing the search was determine when the iMac was
    last used. Proceeding under the Witness Tampering Warrants, he determined that the
    computer had last been powered on in September 2012.                  However, the State
    unsystematically sifted through Wheeler’s digital universe, even though the iMac
    logically could not have contained material created or recorded during the relevant time
    period.
    A failure to describe the items to be searched for and seized with as much
    particularity as the circumstances reasonably allow offends the constitutional protections
    against unreasonable searches and seizures. Because the State was able to more precisely
    describe the items to be searched and seized, the Witness Tampering Warrants violated
    the particularity requirement.
    120
    See id.; 
    Ford, 184 F.3d at 576
    .
    121
    The State also conceded at oral argument before this Court that the relevant time period
    commenced in 2013. See Oral Argument at 40:37.
    39
    2.     The Witness Tampering Warrants Likely Fail the Particularity Requirement for
    Other Reasons
    The Witness Tampering Warrants likely fail the particularity requirement in other
    respects. For example, nothing in the Affidavits supports an inference that evidence may
    be found on DVDs or optical cameras. The Affidavits do not allege that Wheeler was
    communicating with NK or any of the W brothers through videos or pictures. Nor do the
    Affidavits link witness tampering to these types of media. The likely reason that the
    Witness Tampering Warrants sought the search for and seizure of devices and items that
    cannot lead to evidence of witness tampering based on the Affidavits is that, as the State
    conceded, the language was essentially copied and pasted from a search warrant for child
    pornography.      Although the parties agree that cutting and pasting search warrant
    language does not automatically invalidate the resulting instrument, that technique has
    led, in the context of this case, to search warrants that do not satisfy the particularity
    requirement.122
    Further, the Affidavits recite that the State was searching for “evidence of written
    communications,” which it believed were relevant to the alleged witness tampering.
    Sergeant Perna wrote in his forensic report and testified that he was “looking for any files
    created and/or saved as word documents, emails, text messages, pdf [sic] or any other
    122
    Cf. Massachusetts v. Sheppard, 
    468 U.S. 981
    , 986-91 (1984) (scrutinizing police use of a
    form warrant pertaining to an unrelated crime and indicating that it might be insufficiently
    particular, but ultimately upholding the search based upon the good faith exception to the
    exclusionary rule notwithstanding the defect). As noted above, the good faith exception to the
    exclusionary rule is not recognized in Delaware. See 
    Dorsey, 761 A.2d at 820-21
    .
    40
    related file format.”123 The portions of the Affidavits discussing the items sought refer to
    written communications.124 These observations suggest that the items for which there
    was probable cause to search and seize were written communications—not DVDs and
    123
    A191 (Tr. 38:10-19).
    124
    At oral argument before this Court, the State asserted that it was not relying on incorporation
    of the Affidavits into the Witness Tampering Warrants for the latter to satisfy the particularity
    requirement. Oral Argument at 31:50. In Groh v. Ramirez, 
    540 U.S. 551
    (2004), the United
    States Supreme Court observed that, although supporting documentation adequately describes
    the things to be searched for and seized, such description does not necessarily save a warrant
    from its facial invalidity. 
    Id. at 557.
    The Supreme Court noted that: “The Fourth Amendment
    by its terms requires particularity in the warrant, not in the supporting documents.” 
    Id. (citations omitted)
    (emphasis added). It also stated the following: “We do not say that the Fourth
    Amendment prohibits a warrant from cross-referencing other documents. Indeed, most [Federal]
    Courts of Appeals have held that a court may construe a warrant with reference to a supporting
    application or affidavit if the warrant uses appropriate words of incorporation, and if the
    supporting document accompanies the warrant.” 
    Id. at 557-58
    (citations omitted).
    Some Federal Courts of Appeals have limited Groh’s import to establishing that an
    unconstitutional warrant can be saved by its supporting documentation only if the warrant
    appropriately references the supporting document through “clear” language of incorporation and
    the supporting document accompanies the warrant. See, e.g., United States v. Perez, 
    2015 WL 6405695
    , at *3 (6th Cir. Oct. 23, 2015) (citing 
    Groh, 540 U.S. at 557-58
    ); 
    Tracey, 597 F.3d at 146-48
    (citations omitted) (“Along with other Courts of Appeals, we have held that an affidavit
    may be used in determining the scope of a warrant that lacks particularity if the warrant is
    ‘accompanied by an affidavit that is incorporated by reference.’”); United States v. Waker, 
    534 F.3d 168
    , 172-73 (2d Cir. 2008). Others have held that, for an unconstitutional warrant to be
    cured through incorporation by reference to an affidavit, the affidavit must not be filed under
    seal. See, e.g., Bartholomew v. Pennsylvania, 
    221 F.3d 425
    , 429-30 (3d Cir. 2000) (“We now
    make clear . . . and hold that, generally speaking, where the list of items to be seized does not
    appear on the face of the warrant, sealing that list, even though it is ‘incorporated’ in the warrant,
    would violate the Fourth Amendment.”). Here, the Applications and Affidavits indicate that they
    were filed under seal.
    Although the Witness Tampering Warrants, under “ITEMS TO BE SEARCHED FOR
    AND SEIZED[,]” state in paragraph 1, “[e]nter and search the residence [or office] as
    completely described herein [sic] the application and affidavit for evidence of the
    aforementioned crime(s)[,]” it is not clear that the broad lists of items in the Witness Tampering
    Warrants are necessarily limited by the Affidavits and, if so, in what fashion. A19 (Warrant 1 ¶
    1); A31 (Warrant 2 ¶ 1). This is true particularly in view of the fact that the Affidavits contain
    sweeping, boilerplate language concerning digital data and the ability of forensic experts to
    recover it for lengthy periods of time, including “years after it [i]s written.” Thus, even
    assuming, arguendo, that the Affidavits are fairly incorporated, they fail to cure the
    constitutional defects, as they lack temporal restraints as to all potential victims and fail to guide
    the executing officers as to the limits of the search and seizure.
    41
    optical cameras. Yet, by their terms, the Witness Tampering Warrants permitted the
    State to search for anything—from child pornography to medical records to consumer
    information to tax returns.         In short, they permitted the species of wide-ranging,
    exploratory searches the Framers intended to prohibit. Because the lack of temporal
    limitations is sufficient to invalidate the Witness Tampering Warrants, we need not reach
    these other potential substantive challenges.          Instead, we caution that the risk that
    warrants for digital and electronic devices take on the character of “general warrants” is
    substantial. This reality necessitates heightened vigilance, at the outset, on the part of
    judicial officers to guard against unjustified invasions of privacy.
    III.   CONCLUSION
    The subject of this prosecution is an unsympathetic figure.           And the sexual
    exploitation of children is a dreadful scourge in our society. But “[t]he principles laid
    down in this [O]pinion affect the very essence of constitutional liberty and security.
    They reach further than the concrete form of the case before the court . . .; they apply to
    all invasions on the part of the government and its employe[e]s of the sanctity of a
    [person’s] home and the privacies of life.”125 “There is always a temptation in criminal
    cases to let the end justify the means, but as guardians of the Constitution, we must resist
    that temptation.”126
    The United States Constitution and the Delaware Constitution both mandate that
    the decision of the Superior Court with respect to the Motion to Suppress be reversed.
    125
    
    Boyd, 116 U.S. at 630
    .
    126
    Castagnola, 
    2015 WL 1934723
    , at *20 (citation omitted) (internal quotation marks omitted).
    42
    Accordingly, the judgments of conviction are REVERSED. This matter is remanded for
    further proceedings in accordance with this Opinion.
    43
    

Document Info

Docket Number: 205, 2015

Citation Numbers: 135 A.3d 282

Judges: Valihura

Filed Date: 3/2/2016

Precedential Status: Precedential

Modified Date: 1/12/2023

Authorities (43)

United States v. Burgess , 576 F.3d 1078 ( 2009 )

United States v. Riccardi , 405 F.3d 852 ( 2005 )

United States v. Waker , 534 F.3d 168 ( 2008 )

United States v. Stabile , 633 F.3d 219 ( 2011 )

gene-bartholomew-robin-bartholomew-husband-and-wife-v-commonwealth-of-pa , 221 F.3d 425 ( 2000 )

united-states-v-ninety-two-thousand-four-hundred-twenty-two-dollars-and , 307 F.3d 137 ( 2002 )

donald-lester-james-ivan-orrels-dewey-dangelo-alice-dianne-whitmire , 416 F.2d 467 ( 1969 )

United States v. Howard Christine, Perry Grabosky , 687 F.2d 749 ( 1982 )

United States v. Donald G. Ford (97-6097/6270) Sandra ... , 184 F.3d 566 ( 1999 )

United States v. David Scott Zimmerman , 277 F.3d 426 ( 2002 )

united-states-of-america-government-of-the-virgin-islands-v-fathi-yusuf , 461 F.3d 374 ( 2006 )

the-united-states-v-american-investors-of-pittsburgh-inc-john-j-bruno , 879 F.2d 1087 ( 1989 )

United States v. Tracey , 597 F.3d 140 ( 2010 )

united-states-v-louin-ray-bright-c-e-jack-briggs-robert-l-harbin , 630 F.2d 804 ( 1980 )

United States v. Comprehensive Drug Testing, Inc. , 621 F.3d 1162 ( 2010 )

United States v. Comprehensive Drug Testing, Inc. , 579 F.3d 989 ( 2009 )

United States v. Stephen Kow Helen Kim Noi Soo and Hong Tho ... , 58 F.3d 423 ( 1995 )

United States v. Richards , 659 F.3d 527 ( 2011 )

United States v. Elie F. Abboud (04-3942) and Michel Abboud ... , 438 F.3d 554 ( 2006 )

steven-guest-denise-b-kelley-nelda-sturgill-deborah-cummings-randy-bowling , 255 F.3d 325 ( 2001 )

View All Authorities »