Com. v. Ani, N. ( 2023 )


Menu:
  • J-S35011-22
    2023 PA SUPER 67
    COMMONWEALTH OF PENNSYLVANIA               :   IN THE SUPERIOR COURT OF
    :        PENNSYLVANIA
    Appellant               :
    :
    :
    v.                             :
    :
    :
    NNAEMEKA ANI                               :   No. 1208 MDA 2021
    Appeal from the Order Entered August 12, 2021
    In the Court of Common Pleas of Centre County Criminal Division at
    No(s): CP-14-CR-0001582-2019
    BEFORE:      BENDER, P.J.E., McLAUGHLIN, J., and STEVENS, P.J.E.*
    OPINION BY BENDER, P.J.E.:                     FILED: APRIL 17, 2023
    The Commonwealth appeals from the trial court’s order granting
    Appellee Nnaemeka Ani’s motion to suppress all evidence recovered from the
    execution of five search warrants. Each warrant pertained to Appellee’s cell
    phone, its iCloud1 backups, or its service provider records. The trial court
    determined that each warrant was lacking in probable cause and/or
    overbroad. The Commonwealth has abandoned its challenge to the first two
    warrants, arguing that the remaining three were valid. Our primary task is to
    decide the applicability of Commonwealth v. Green, 
    265 A.3d 541
     (Pa.
    2021), issued after the trial court’s order, which held that the standard
    ____________________________________________
    *   Former Justice specially assigned to the Superior Court.
    1The iCloud service backs up data contained on an iPhone, typically items like
    photos, videos, text messages, and device settings.
    J-S35011-22
    announced in Commonwealth v. Grossman, 
    555 A.2d 896
     (Pa. 1989)
    (holding that the Pennsylvania Constitution requires a description of items to
    be seized “as specifically as is reasonably possible”), applies to searches of
    digital spaces.     Alternatively, the Commonwealth asserts that the three
    warrants established probable cause to at least some of the items requested
    in the warrants and that the trial court erred by failing to conduct a severability
    analysis. We conclude that the Commonwealth failed to establish probable
    cause to search Appellee’s cell phone for the vast majority of items requested.
    We agree that the doctrine of severability applies and hold that the
    Commonwealth may use locational data generated by the phone as well as
    data pertaining to Appellee’s use of the phone’s flashlight function with respect
    to the third warrant. We agree with Appellee that the fourth and fifth warrants
    must be suppressed as fruit of the poisonous tree. We therefore affirm in
    part, reverse in part, and remand for further proceedings.
    I.
    Factual and procedural history
    The five search warrants involved Appellee’s alleged role in a series of
    home invasion crimes.2 For ease of discussion, we first set forth a summary
    of the facts.
    ____________________________________________
    2We also note that this criminal case was consolidated with a rape case, for
    which Appellee has been convicted and sentenced. Commonwealth v. Ani,
    (Footnote Continued Next Page)
    -2-
    J-S35011-22
    The investigation commenced on November 2, 2019, when Natalia
    Beltran, a Pennsylvania State University student residing in the University
    Terrace apartment complex, called the State College Police Department
    shortly after 8:00 a.m., reporting that an unknown male had entered her
    bedroom. Beltran, who had been sleeping, stirred when the actor shone a
    light from his cell phone on her.         She pretended to wake up to scare the
    individual, who fled the bedroom. Officers obtained surveillance video from
    the apartment complex, showing a male, later identified as Appellee,
    attempting to open several doors in the hallway. Appellee is seen entering
    Beltran’s apartment at 08:05 a.m. and exiting three minutes later.        Video
    surveillance showed Appellee entering two other apartments on November 2.
    Building management confirmed that Appellee was a resident of
    University Terrace, and they suspected that he was responsible for two
    unresolved criminal trespass incidents reported by fellow University Terrace
    residents, occurring on October 13, 2019, and October 31, 2019. Officers
    spoke to eyewitnesses, who reported the following. Kate Deng discovered
    Appellee inside her University Terrace apartment on October 13, 2019.
    Appellee claimed that he was visiting a roommate of Deng’s, and told Deng
    that he would text her roommate. The victim observed Appellee using his cell
    ____________________________________________
    
    283 A.3d 386
     (Pa. Super. 2022) (unpublished memorandum). That matter is
    pertinent to the investigation as it is referenced within the fifth warrant
    application.
    -3-
    J-S35011-22
    phone. Deng also reported that on October 16, 2019, she heard her front
    door close but no one else had been inside the apartment. Her roommate,
    Abigail Helmer, discovered that a vape cartridge had been moved from her
    bedroom to the living room. Deng identified Appellee from a photo lineup.
    Regarding the October 31 incident, Hilda Sould told police that she heard
    someone inside her apartment.        A neighbor confronted Appellee shortly
    thereafter and identified Appellee from a photo lineup.
    Appellee was arrested on November 5, 2019, and the police seized a
    black iPhone 6 incident to the arrest. The authorities secured search warrants
    for the phone and ultimately found several incriminating images and videos
    occurring over the timespan of October 13, 2019, through November 5, 2019.
    These items included a photograph of Deng sleeping taken from inside her
    bedroom and evidence that Appellee took pictures of stolen credit cards.
    The Commonwealth charged Appellee via criminal information with six
    counts, with a date range of October 13, 2019, through November 2, 2019.
    Counts one, two, and three were for violations of 18 Pa.C.S. § 3502(a)(1)(ii)
    (Burglary), and counts four, five, and six for violations of 18 Pa.C.S. §
    3503(a)(1)(i) (Criminal Trespass).    The first three counts do not specify a
    -4-
    J-S35011-22
    victim. Counts four, five, and six name, respectively, Natalia Bertrand, Kate
    Deng, and Abigail Helmer.3
    On April 1, 2021, Appellee filed a motion to suppress the five search
    warrants, arguing that each warrant was “not supported by probable cause,
    is overly broad, and is lacking in particularity[.]” Motion, 4/1/21, at 9 (first
    warrant). An identical claim was asserted against each of the other warrants.
    Id. at 11 (second warrant); 13 (third warrant); 15 (fourth warrant); 23 (fifth
    warrant). The Commonwealth filed a brief in response on July 26, 2021. The
    trial court entered an order and accompanying opinion on August 10, 2021,
    suppressing all evidence recovered from the warrants.
    We now set forth the contents of each warrant application.       This is
    necessary because the legal determination of whether a warrant was
    supported by probable cause is limited to the four corners of the affidavit.
    Commonwealth v. Coleman, 
    830 A.2d 554
    , 560 (Pa. 2003). “[E]ven the
    slightest alteration in the underlying facts can have great effect on the
    probable cause analysis.” Commonwealth v. Johnson, 
    240 A.3d 575
    , 589
    n.7 (Pa. 2020) (Opinion Announcing the Judgment of the Court).          In this
    regard, Appellee points to facts missing in some of the warrant applications.
    See, e.g., Appellee’s Brief at 22 (noting that the third warrant application,
    ____________________________________________
    3 It does not appear that the Commonwealth had charged Appellee with any
    additional crimes following the execution of these warrants and prior to the
    trial court’s suppressing the evidence.
    -5-
    J-S35011-22
    unlike the first application, did not state that Appellee appeared to be sending
    a text message). The Commonwealth has abandoned its challenges to the
    first two warrants. Accordingly, before addressing the legal issues, we discuss
    the three warrants at issue, which are the third, fourth, and fifth warrants in
    chronological order.
    Warrant #3 - April 21, 2020
    This warrant listed the item to be searched as a “[c]ell phone belonging
    to [Appellee]. The cell phone is a black iPhone 6.” Application for Search
    Warrant, 4/21/20, at 1.    Under the “identify items to be searched for and
    seized” field, the application states, “See attachment A.” That document was
    appended to the application. It states:
    The memory/data storage of a black iPhone 6 cellular handset
    belonging to [Appellee] for data/information, and any “cloud”
    storage applications connected to the cellular handset,
    concerning any of the following on October 13, 2019, October 31,
    2019, and November 2, 2019: use of the flashlight; Apple Health
    data; use of the camera application to take photographs or record
    video; use of any applications requiring the use of the phone’s
    keyboard, including text, photo, or video message applications,
    Internet browsers, and applications for voice or video calls;
    locational data, as compiled by the phone’s internal GPS device
    or other components or applications of the phone capable of
    identifying and memorializing the geographic location of the
    cellular handset. The search is to be conducted for evidence,
    direct and corroborative, of the criminal offenses identified in the
    Affidavit of Probable Cause to this warrant application,
    incorporated herein by reference in its entirety.
    
    Id.
     (Attachment).
    The affidavit begins by explaining the police response to Beltran’s
    apartment on November 2, 2019, and references her observation that the
    -6-
    J-S35011-22
    male “entered her bedroom and flashed a light from his phone on her person.”
    Id. at 2. It discusses the video surveillance showing Appellee visiting two
    other apartments on November 2, 2019.
    With respect to October 13, 2019, the affidavit establishes that
    Detective Hanes “interviewed the residents … on 11/5/19.” Id. at 3. This
    interview included Kate Deng and her boyfriend, Peter Giammanco. Id. Deng
    informed Detective Hanes that she was in her bedroom and heard the back
    door to her apartment open. When she went to see if it was her roommate
    she saw “a black male standing in her kitchen who she did not know.” Id.
    The actor claimed that he was waiting for Deng’s roommate and “said he would
    text her roommate[.]” Id. He then exited the apartment. A few days later,
    Giammanco entered Deng’s apartment through the back entrance. He heard
    the front door close. He asked Deng if anyone else was home. Deng stated
    she had been sleeping and had not invited anyone inside. Id. Deng identified
    Appellee from a photo lineup. Id.
    The affidavit also discusses the October 31, 2019 incident. Detective
    Hanes’ affidavit states that two police officers went to Hilda Sould’s apartment.
    She reported that on October 31, 2019, she heard a door close and went to
    investigate. As she did so, her neighbor Rafi Birro “was walking up to the
    apartment and stated he just saw a black male exit her apartment and jog
    away.” Id. Detective Hanes then interviewed Birro, who stated that he was
    returning to his apartment when he saw a black male exit Sould’s apartment.
    -7-
    J-S35011-22
    The male “covered his face with a hood and jogged from the area.” Id. Birro
    identified Appellee from a photo lineup.
    Warrant #4 - May 22, 2020
    The fourth warrant was to be served on Apple, Inc., as the manufacturer
    of Appellee’s cell phone. The application requested a warrant to search the
    following:
    All storage backups to the iCloud for the iOS device associated
    with the following email accounts: ralphemek@gmail.com &
    ranlmeks@gmail.com and associated with phone number,
    14127588148, that ha[ve] occurred from 10/13/2019 through
    11/5/2019. Items to be searched for are applications generating
    locational data and/or other information consistent with Ani’s
    presence and behavior at the scene of the offenses described in
    the affidavit. The backups should include information on, but not
    limited to, the subscriber information for the Apple accounts, mail
    logs, my Photo Stream; iCloud Photo Library; Internet Browsing
    History; Maps Search History; all messages including SMS; MMS,
    iMessages, and other messaging applications; Health Data; IP
    address logins; and other information on when iOS Device
    Backups had been completed by the device.
    Application for Search Warrant, 5/22/20, at 1.
    The affidavit of probable cause discusses the execution of Warrant #3.
    The affidavit states that Officer Dan Lewis of Ferguson Township assisted and
    was unable to complete a full extraction due to its passcode security.
    However, Officer Lewis “was able to perform a partial extraction of the cell
    phone.” Id. at 4. That partial extraction revealed that the phone was linked
    to   two     Apple   iCloud    accounts    under     the   email    addresses
    ralphemek@gmail.com and ranlmeks@gmail.com. Additionally, a backup to
    the cloud service was completed on November 5, 2019. The partial execution
    -8-
    J-S35011-22
    also indicated that the phone connected to several WiFi access points in the
    University Terrace building around the time of the November 2, 2019
    burglaries.
    The detective stated, based on his training and experience, that iPhones
    use “Locational Based Services in several applications … to assist the user with
    information and services.”     Id.   The affidavit listed dozens of applications
    which commonly use these location services, including Facebook, Instagram,
    web browsing apps, weather apps, messaging apps, dating apps, health apps,
    and ridesharing apps. Location data can also pinpoint where photographs and
    videos were taken by using GPS, Bluetooth, WiFi, and cell tower locations to
    determine the phone’s location.      Id. Detective Hanes requested a search
    warrant for all storage backups to the iCloud service “that ha[ve] occurred
    from 10/13/19 through 11/5/19.”        Id.   The affiant intended to search for
    “applications generating locational data and/or other information consistent
    with [Appellee]’s presence and behavior at the scene of the offenses described
    in the affidavit.” Id.
    Warrant #5 - September 8, 2020
    The final warrant at issue was obtained after the execution of Warrant
    #4 produced several incriminating photographs. It requested permission to
    search for the following items:
    Photographs, videos, and associated geolocation data comprising
    evidence of the crimes of rape/sexual assault, burglary, criminal
    trespass, loitering and prowling at nighttime, invasion of privacy,
    theft, identity theft, and access device fraud found on the iCloud
    -9-
    J-S35011-22
    backups      associated     ralphemek@gmail.com         [sic]   &
    ranimeks@gmail.com and phone number, 14127588148,
    currently in the possession of affiant, Detective Martin-Hanes, at
    the State College Police Department.
    Application for Search Warrant, 9/8/20, at 1.
    The premises to be searched were listed as the iCloud back up data as
    provided by Apple, which was likewise “currently in the possession of the State
    College Police Department.”        Id.
    A ten-page affidavit was attached. The affidavit begins by discussing a
    series of crimes reported to the Ferguson Township Police Department
    between July 2017 and December 2018. The affidavit supplies details of over
    a dozen incidents, which included a series of loitering complaints, suspected
    burglaries, and rape. All of these incidents occurred in the area of 110 West
    Aaron Drive, with a consistent suspect description. The affidavit relates that
    Appellee was arrested on December 17, 2018, and an iPhone was seized
    incident to the arrest.4       A search warrant for DNA was obtained, and on
    January 11, 2019, the lab reported that Appellee’s DNA was linked to a rape
    reported on October 18, 2017. Appellee was charged on January 15, 2019,
    for that rape, and, on May 18, 2019, Appellee posted bail and was released
    from Centre County Jail. As previously mentioned, Appellee was convicted of
    this rape.
    ____________________________________________
    4 It is not clear whether this was a different phone, as authorities seized an
    iPhone on November 5, 2019, when Appellee was arrested.
    - 10 -
    J-S35011-22
    The next paragraph discusses the November 2, 2019 report from Beltran
    that precipitated this set of warrants, as well as the follow-up investigations
    and the execution of the April warrant.        This affidavit describes what the
    authorities learned from Warrant #4.       After Apple provided the material,
    Detective Hanes received assistance from “Glenn K. Bard of PATCtech,” who
    was able to decrypt the supplied data. Id. at 9. The data was then loaded
    into forensic software for review. This review “uncovered evidence of criminal
    activity committed by [Appellee] within the time frame specified in the
    warrant, 10/13/19 through 11/5/19.”           Id.   Additionally, “[a]s Bard was
    locating the relevant images … he noticed numerous images of Driver’s
    licenses and credit cards in plain view.” Id. at 10. These images showed the
    name “Erica Culler” and Detective Hanes confirmed that Culler had made a
    report on July 16, 2018 “of an unknown black male who was seen holding her
    wallet[.]” Id. Based on the several unsolved incidents in the same geographic
    area with a suspect profile matching Appellee, this warrant sought to expand
    the search of Appellee’s phone.
    Suppression and appeal
    The trial court granted Appellee’s motion to suppress and filed an
    accompanying opinion with its order.     The court concluded with respect to
    Warrant #3 that
    not all items requested … were supported by probable cause.
    Specifically, the [c]ourt finds the request to search the ‘use of any
    applications requiring the use of the phone’s keyboard, including
    text, photo, or video message applications, Internet browsers, and
    - 11 -
    J-S35011-22
    applications for voice or video calls[]’ that occurred on October
    13, 2019, October 31, 2019, and November 2, 2019 to be
    overbroad and unsupported by probable cause.
    Order, 8/10/21, at 10.
    The court explained that the four corners of the affidavit mentioned
    Appellee’s phone only twice, which established that Appellee was observed
    using his phone’s flashlight function in Beltran’s apartment and that he
    mentioned texting when confronted by Deng. The court concluded that these
    references “do[] not provide law enforcement with sufficient probable cause
    to have such broad access to [Appellee]’s cellular phone.       The [a]ffidavit
    provided no information alleging [Appellee] took a photograph or filmed a
    video during the October 13th and October 31st incidents.” Id. at 11. The
    court determined that the request to search for anything that used the phone’s
    keyboard was “overbroad[,] as it is difficult to imagine what application, if
    any, does not in some way require the use of the cellular phone’s keyboard.”
    Id.
    The Commonwealth filed a timely notice of appeal pursuant to Rule of
    Appellate Procedure 311(d)5 and complied with the trial court’s order to file a
    Pa.R.A.P. 1925(b) statement. The Commonwealth raised, for the first time, a
    ____________________________________________
    5  “In a criminal case … the Commonwealth may take an appeal as of right
    from an order that does not end the entire case where the Commonwealth
    certifies in the notice of appeal that the order will terminate
    or substantially handicap the prosecution.” Pa.R.A.P.311(d). In its notice of
    appeal, the Commonwealth certified that the prosecution of Appellee is
    substantially handicapped by the trial court’s order granting suppression.
    - 12 -
    J-S35011-22
    claim that the trial court should have severed any portions of the warrant it
    deemed invalid.   Id.   The court filed a Rule 1925(a) opinion, adopting its
    previously-filed opinion as to the warrants.   Responding to the severance
    claim, the trial court stated, “some items contained in the … warrant
    applications were supported by sufficient probable cause.   However, … the
    vast majority of the items … were unsupported[.]”       Trial Court Opinion,
    10/11/21, at 2. The Commonwealth raises the following two issues for our
    review:
    [1.] Whether the suppression court erred in granting suppression
    on the following grounds:
    a. [T]hat Warrant #3 was overbroad because it
    “grant[ed] law enforcement … unlimited access to
    [Appellee’s] cellular phone for the day in question,
    allowing them to use Warrant #3 as an investigatory
    tool”;
    b. [T]hat Warrant #4’s authorization to search for and
    seize “other information consistent with [Appellee]’s
    presence and behavior at the scene of the offenses”
    rendered the warrant “overly broad and lacking in
    particularity”; and
    c. [T]hat Warrant #5’s authorization to search for and
    seize    “photographs,     videos,  and    associated
    geolocational data comprising evidence” of crimes
    described in Affidavit #5 rendered the warrant invalid
    because the date range for those crimes was not
    specifically described.
    [2.] Whether, assuming that portions of Warrants 3, 4, and 5
    suffered from overbreadth, the suppression court erroneously
    failed to apply the doctrine of severance to the valid portions of
    the warrants.
    Commonwealth’s Brief at 4.
    - 13 -
    J-S35011-22
    II.
    Parties’ Arguments
    Commonwealth
    The Commonwealth’s fundamental position is that there was probable
    cause to believe that Appellee’s iPhone contained evidence of the home
    invasion crimes because Appellee was seen using his phone by various
    eyewitnesses. It emphasizes that a review of the four corners of an affidavit
    requires a commonsense view and courts cannot read the language in a hyper-
    technical fashion.
    The Commonwealth submits that the Supreme Court of Pennsylvania’s
    decision in Green, discussed in greater detail infra, establishes that the trial
    court erred in suppressing these warrants.     Starting with Warrant #3, the
    Commonwealth argues that the trial court erroneously focused on the
    language permitting officers to search for the “use of any applications
    requiring the use of the phone’s keyboard” as being overbroad.      Application
    for Search Warrant, 4/21/20 (Attachment). The affidavit, which was expressly
    incorporated into the warrant, contained “limiting language constrain[ing] the
    search to evidence related to” criminal trespass and burglary offenses.
    Commonwealth’s Brief at 26.      Moreover, the warrant was limited to three
    dates: October 13, October 31, and November 2, 2019.            “This temporal
    specificity goes above and beyond the Green requirements.” Id. According
    to the Commonwealth, the temporal limitation and the limiting language
    ensured that “no indiscriminate or discretionary search of the phone could
    - 14 -
    J-S35011-22
    have been conducted[.]” Id. The facts submitted in the application permitted
    the magistrate to conclude that “evidence of criminal activity was likely to be
    found on [Appellee]’s phone.” Id. at 27. The Commonwealth argues that the
    facts established “a pattern of trespassing into the residences of young women
    without their knowledge, when they were present, at times using his phone
    and, in any event, probably in possession of a phone that was compiling
    evidence of his location.” Id.
    Turning to Warrant #4, the Commonwealth criticizes the trial court for
    focusing on the language allowing the affiant to search for evidence
    “consistent with [Appellee]’s presence and behavior at the scene of the
    offenses described in the affidavit.” Application for Search Warrant, 5/22/20,
    at 4. The trial court determined that this was too vague. The Commonwealth
    argues that the trial court read the language “in a vacuum, ignoring the
    detailed qualifications in the affidavit.” Commonwealth’s Brief at 28-29. “Had
    [the trial court] read the rest of the sentence, the court would have recognized
    that the crimes in the affidavit were limited to the dates the burglaries and
    trespasses occurred on October 13, 2019, October 31, 2019, and November
    2019.” Id. at 29. Additionally, “the information sought was limited to only
    those items/information specifically identified in the affidavit.”     Id.   The
    warrant application “does not list general classes such as ‘all data’ or ‘all
    applications’; rather, the affiant specifies the exact types of data which should
    be included in the backups.” Id. The items requested “relate directly to the
    - 15 -
    J-S35011-22
    ‘offenses described in the affidavit.’” Id. (quoting warrant application). The
    warrant was limited “to iCloud backups from October 13, 2019 through
    November 5, 2019 (which encompassed the criminal incidents described in
    the affidavit).” Id. at 30.
    Finally, regarding Warrant #5, the Commonwealth emphasizes that the
    trial court acknowledged that probable cause existed to conduct a limited
    search of Appellee’s iCloud backups. The court, in its view, erred by citing the
    possibility that the Commonwealth was permitted to search all the way back
    to 2011, when the iCloud service was launched. Warrant #5 did not seek
    authorization to go back to 2011; rather, it “clearly defined the temporal scope
    of the warrant, identifying with specificity various criminal offenses committed
    from September of 2017 through 2019 concerning which there was a
    reasonable probability of [Appellee]’s involvement.” Id. at 32. As with the
    prior offenses, the affidavit makes clear “that the items sought pertain to
    specifically-identified criminal acts,” as set forth in the affidavit of probable
    cause. Id. at 33.
    Alternatively, the Commonwealth argues that if this Court agrees that
    probable cause was lacking to some of the items, the trial court erred by failing
    to apply the doctrine of severance.
    Appellee
    Appellee submits that this Court should accept the trial court’s analysis
    of each warrant. The court thoroughly reviewed each warrant and measured
    - 16 -
    J-S35011-22
    the sufficiency of the warrant’s description against the items supported by
    probable cause. Appellee explicitly notes that this claim is raised under both
    the Fourth Amendment to the United States Constitution and Article I, Section
    8 of the Pennsylvania Constitution, and cites the Grossman standard, which
    is specific to Article I, Section 8.
    Beginning with Warrant #3, Appellee points out that, unlike Warrant #1,
    this application did not mention Appellee’s being seen texting on his phone.
    Appellee’s Brief at 21-22. While the affidavit mentions Beltran seeing Appellee
    use his phone’s flashlight, the only mention of texting is the conversation
    between Deng and Appellee, wherein Appellee told Deng that he was looking
    for her roommate and would text her. Appellee additionally submits that, in
    any event, there is nothing in the affidavit of probable cause to indicate that
    Appellee used his phone to take pictures or record video.
    Turning to Warrant #4, Appellee agrees with the trial court that the
    request to search for information “consistent with” Appellee’s presence and
    behavior gives officers unbridled discretion. “There is no indication of what
    type of ‘other information’ police were expecting to find on the phone.” Id.
    at 29. The “vagueness and lack of any type of specificity and particularity
    provided for in this description” establishes “the lack of probable cause[.]” Id.
    Moreover, the warrant was not limited to three specific dates, unlike Warrant
    #3. Instead, the warrant was for an entire three-week period. In conjunction
    with the vague authority to look for any information “consistent with”
    - 17 -
    J-S35011-22
    Appellee’s presence, authorities were seeking to conduct a general exploratory
    search, which is forbidden by both the United States and Pennsylvania
    Constitutions.   Appellee also submits that this warrant was tainted by the
    illegal searches performed under the three prior warrants, all of which were
    found invalid. Id. It is clear that the authorities relied on information from
    the prior warrants because Warrant #4 explicitly references the results of
    Warrant #3. Id. at 34. Appellee also argues that the Commonwealth would
    not have been able to determine the email accounts associated with his iCloud
    backups and his cell phone number absent the execution of the first two
    warrants, which the Commonwealth no longer challenges.
    Finally, Appellee acknowledges that Warrant #5 establishes a stronger
    basis for probable cause because it references incriminating evidence found
    during the prior searches. However, Appellee maintains that the warrant is
    still defective because it gives police “carte blanche to search the entire phone
    for any and all photos and videos.” Id. at 36. In any event, this warrant was
    tainted because the incriminating evidence on which this warrant rests were
    uncovered during the execution of Warrant #4. Id. at 38.
    III.
    Searching a cell phone presents difficult Fourth Amendment and Article
    I, Section 8 questions. While the validity of the warrant is a question of law,
    “we are not to conduct a de novo review of the issuing authority’s probable
    cause determination, but are simply to determine whether or not there is
    - 18 -
    J-S35011-22
    substantial evidence in the record supporting the decision to issue the
    warrant.” Commonwealth v. Torres, 
    764 A.2d 532
    , 540 (Pa. 2001).
    We begin with the general principles applicable to search warrants.
    A
    General principles
    The United States Constitution6 and the Pennsylvania Constitution7 both
    protect citizens from unreasonable searches and seizures.           The Fourth
    Amendment “was a reaction to the evils of the use of the general warrant in
    England and the writs of assistance in the Colonies, and was intended to
    protect against invasions of the sanctity of a man’s home and the privacies of
    life, from searches under indiscriminate, general authority.” Warden, Md.
    Penitentiary v. Hayden, 
    387 U.S. 294
    , 301 (1967) (quotation marks and
    citation omitted).     Pennsylvania’s analogous constitutional provision stems
    from the same concern.           “The framers of the Pennsylvania Constitution
    thought the right to be free from unrestricted police intrusions so critical that
    ____________________________________________
    6 “The right of the people to be secure in their persons, houses, papers, and
    effects, against unreasonable searches and seizures, shall not be violated, and
    no Warrants shall issue, but upon probable cause, supported by Oath or
    affirmation, and particularly describing the place to be searched, and the
    persons or things to be seized.” U.S. Const. amend. IV.
    7 “The people shall be secure in their persons, houses, papers and possessions
    from unreasonable searches and seizures, and no warrant to search any place
    or to seize any person or things shall issue without describing them as nearly
    as may be, nor without probable cause, supported by oath or affirmation
    subscribed to by the affiant.” Pa. Const. Art. I, § 8.
    - 19 -
    J-S35011-22
    they secured the right for future generations by including it in the original
    Constitution of 1776.” Grossman, 555 A.2d at 899.
    Obviously, this is not an absolute bar on searching protected areas,
    provided that the authorities possess sufficient probable cause to search as
    determined by a neutral magistrate. “The point of the Fourth Amendment …
    is not that it denies law enforcement the support of the usual inferences which
    reasonable men draw from evidence. Its protection consists in requiring that
    those inferences be drawn by a neutral and detached magistrate[.]” Johnson
    v. United States, 
    333 U.S. 10
    , 13–14 (1948). “[P]robable cause is a fluid
    concept—turning on the assessment of probabilities in particular factual
    contexts—not readily, or even usefully, reduced to a neat set of legal rules.”
    Illinois v. Gates, 
    462 U.S. 213
    , 232 (1983). See Commonwealth v. Gray,
    
    503 A.2d 921
    , 922 (Pa. 1985) (adopting Gates as the test for search warrants
    under Article I, Section 8). “To establish probable cause, the Commonwealth
    must demonstrate that a search meets the requirements of the ‘totality-of-
    the-circumstances’ test.” Commonwealth v. Barr, 
    266 A.3d 25
    , 40 (Pa.
    2021) (citation omitted). A magistrate presented with an application for a
    warrant must “make a practical, common-sense decision whether, given all
    the circumstances set forth in the affidavit before him … there is a fair
    probability that contraband or evidence of a crime will be found in a particular
    place.” 
    Id.
     (citation omitted).
    - 20 -
    J-S35011-22
    If there is probable cause to search, the warrant must be properly
    limited in scope. “The requirement that warrants shall particularly describe
    the things to be seized makes general searches under them impossible and
    prevents the seizure of one thing under a warrant describing another. As to
    what is to be taken, nothing is left to the discretion of the officer executing
    the warrant.” Marron v. United States, 
    275 U.S. 192
    , 196 (1927). Our
    charter has been interpreted to offer more protections than its federal
    counterpart in several areas, including the required degree of particularity.
    The language of the Pennsylvania Constitution requires that a
    warrant describe the items to be seized “as nearly as may be….”
    The clear meaning of the language is that a warrant must describe
    the items as specifically as is reasonably possible.         This
    requirement is more stringent than that of the Fourth
    Amendment, which merely requires particularity in the
    description.
    Grossman, 555 A.2d at 899 (footnote omitted).
    This Court has recognized that the particularity component subsumes
    two distinct, although often related, concepts. The first concept addresses the
    degree of particularity required.   A warrant that is not “particular enough”
    permits “a search in terms so ambiguous as to allow the executing officers to
    pick and choose,” which amounts to the rummaging that so offended the
    drafters of the federal and state constitutions. Commonwealth v. Santner,
    
    454 A.2d 24
    , 25 n.2 (Pa. Super. 1982). This first component thus ensures
    that the authorities are sufficiently limited in what they can seize. The second
    concept is overbreadth. A warrant can be clear in terms of what will be seized,
    - 21 -
    J-S35011-22
    thus ensuring that the authorities’ discretion does not permit a general
    rummaging.       But if the warrant allows authorities to seize items for which
    probable cause does not exist, it may be overbroad. 
    Id.
    Applying these concepts to the digital evidence sphere, our sister court,
    the Oregon Court of Appeals, offered a summary of these distinct concepts in
    a case involving the search of digital evidence, framing the former concept as
    “specificity.”
    Those two concepts—specificity and overbreadth—again, have
    independent significance. For example, a warrant can precisely
    and unambiguously identify items to be forensically examined,
    satisfying the specificity concern, but nevertheless be invalid as
    overbroad if there is no probable cause to examine some of those
    items. However, the two can, and frequently do, conflate. That
    is, failure to identify with sufficient specificity the place to be
    searched or the items to be seized and examined can sanction
    invasions of protected privacy unsupported by probable
    cause. See, e.g., State v. Castagnola, 
    145 Ohio St.3d 1
    , 17,
    
    46 N.E.3d 638
    , 656 (2015) (noting “overlap” of those concepts
    with respect to warranted searches of electronic devices).
    State v. Mansor, 
    381 P.3d 930
    , 793–939 (Or. App. 2016), aff’d, 
    421 P.3d 323
     (Or. 2018).        Our Supreme Court has identified these defects as
    “symptoms of the same disease.”
    Moreover, for particularity purposes, we have clarified that
    although some courts have treated overbreadth and ambiguity as
    relating to distinct defects in a warrant, see Commonwealth v.
    Santner, … 
    454 A.2d 24
    , 25 n.2 ([Pa. Super.] 1982), “both
    doctrines diagnose symptoms of the same disease: a warrant
    whose description does not describe as nearly as may be those
    items for which there is probable cause.” Grossman, 555 A.2d
    at 899-900.
    Johnson, 240 A.3d at 584.
    B
    - 22 -
    J-S35011-22
    Digital versus physical
    Searching digital evidence poses unique issues, owing to the distinctions
    between searching physical versus digital spaces.       Before the advent of
    personal electronic devices and their tremendous storage capacities, the usual
    Fourth Amendment case involved the search of a physical space. The United
    States Supreme Court has held that, when searching a physical space for an
    item, authorities may search anywhere where that item may be.
    A lawful search of fixed premises generally extends to the entire
    area in which the object of the search may be found and is not
    limited by the possibility that separate acts of entry or opening
    may be required to complete the search. Thus, a warrant that
    authorizes an officer to search a home for illegal weapons also
    provides authority to open closets, chests, drawers, and
    containers in which the weapon might be found. A warrant to
    open a footlocker to search for marihuana would also authorize
    the opening of packages found inside. A warrant to search a
    vehicle would support a search of every part of the vehicle that
    might contain the object of the search. When a legitimate search
    is under way, and when its purpose and its limits have been
    precisely defined, nice distinctions between closets, drawers, and
    containers, in the case of a home, or between glove
    compartments, upholstered seats, trunks, and wrapped packages,
    in the case of a vehicle, must give way to the interest in the
    prompt and efficient completion of the task at hand.
    United States v. Ross, 
    456 U.S. 798
    , 820–21 (1982) (footnotes omitted).
    “The    United   States   Supreme      Court    has   advised   that   a
    valid search warrant authorizes the search of any container found on the
    premises that might contain the object of the search.” Commonwealth v.
    Petty, 
    157 A.3d 953
    , 957 (Pa. Super. 2017) (citing Ross). As a result, if
    police have probable cause to seize a particular piece of property, that
    - 23 -
    J-S35011-22
    probable cause permits a search of anywhere where the item could be located.
    See Commonwealth v. Turpin, 
    216 A.3d 1055
    , 1060 (Pa. 2019) (holding
    that Article I, Section 8 “does not preclude a search of the entire residence
    regardless of whether a particular individual not named in the warrant has an
    expectation of privacy in certain areas of that residence”). This includes the
    ability to cursorily examine items to see what they are.           Andresen v.
    Maryland, 
    427 U.S. 463
    , 482 n.11 (1976) (“[I]t is certain that some
    innocuous documents will be examined, at least cursorily, in order to
    determine whether they are, in fact, among those papers authorized to be
    seized.”).
    That principle is much easier to apply in the physical world; an officer
    could not open a closet to search for a stolen vehicle. However, the container
    analogy breaks down when considering a device like a computer or phone.
    The United States Supreme Court’s decision in Riley v. California, 
    573 U.S. 373
     (2014), held that the search incident to arrest exception does not permit
    a search of a phone. “Treating a cell phone as a container whose contents
    may be searched incident to an arrest is a bit strained as an initial matter.”
    Id. at 397. Moreover, when executing a search of a physical space to seize
    items, the seizure and search occur more or less simultaneously. Officers who
    have probable cause to seize a particular item will first search for it then, when
    it is discovered, seize it. Searching through digital evidence differs in that it
    usually entails a search for the devices that are seized, followed by a later,
    - 24 -
    J-S35011-22
    second search of the seized devices, with the later search almost always
    occurring off-site.   See Commonwealth v. Orie, 
    88 A.3d 983
    , 1008 (Pa.
    Super. 2014) (“Given the distinctive nature of a USB flash drive, like other
    types of digital storage systems (e.g., a computer hard drive), it must
    be seized in its entirety first and then searched at a later time (typically by
    someone with an expertise in this area).”) (emphasis in original).
    The container analogy can become even more strained when the data
    “may not in fact be stored on the device itself. … Cell phone users often may
    not know whether particular information is stored on the device or in the cloud,
    and it generally makes little difference.” Riley, 573 U.S. at 397. And the
    very nature of digital evidence makes it far more difficult to identify in advance
    which “containers” in the device might hold the sought items. Consider child
    pornography, as discussed in our Supreme Court’s decision in Green. There,
    authorities discovered that a particular child pornography image was available
    on a file-sharing network.    The affiants determined that the material was
    shared from Green’s residence, but they could not identify the particular
    device sharing the file.   Thus, the affiants obtained a warrant to seize all
    electronic storage devices from his home, which would then be taken offsite
    and “searched for evidence relating to the possession and/or distribution of
    child pornography.”     Green, 265 A.3d at 546 (quoting application for
    warrant). The Green Court first concluded that the warrant was not defective
    in terms of the items to be seized.       The next question was whether the
    - 25 -
    J-S35011-22
    authorized search of the devices seized was overbroad. Green argued that
    the authorities’ probable cause “was limited to the evidence of child
    pornography shared from his IP address on December 28, 2014, and therefore
    the warrant was overbroad for failing to include ‘specific dates, types of files,
    [or] specific programs.’”   Id. at 554 (quoting Green’s brief; bracketing in
    original). This asserted limitation was based on the fact that the affiant
    downloaded a specific child pornography image. The Court disagreed, stating:
    Although Corporal Goodyear personally downloaded an image file
    depicting child pornography on December 28, 2014, that did not
    mean probable cause was limited to that particular date or that
    particular file. The affidavit of probable cause explained that,
    based on the corporals’ experience investigating this type of
    crime, individuals who download and share child pornography
    usually maintain a collection of child pornography in a secure,
    private location for long periods of time. Importantly, the affidavit
    noted that the user investigated here “had such a collection of
    child pornography available on a [file-sharing] network.” Affidavit
    of Probable Cause at ¶ 25. These facts established probable cause
    that someone was sharing a collection of child pornography in
    general, which is exactly what the warrant permitted the officers
    to search for and seize. Because probable cause was not limited
    to the single instance of conduct that [the a]ppellant points to, the
    warrant did not need to include a specific date, type of file, or
    program in order to satisfy the requirement to describe the items
    as nearly as may be.
    Id.
    Green also argued that the warrant’s self-limiting language, which
    restricted the officers to search for “evidence relating to the possession and/or
    distribution of child pornography,” was not a meaningful check on officers’
    discretion and was therefore overbroad. The Court responded that this case
    “is not one where officers were given free rein to look at anything within the
    - 26 -
    J-S35011-22
    phone to generally look for evidence of a crime.” Id. at 554. The Court cited
    our decisions in Orie, 
    supra,
     and Commonwealth v. Melvin, 
    103 A.3d 1
    (Pa. Super. 2014), as cases that properly deemed a warrant overbroad
    because those warrants permitted rummaging.
    The Green Court rejected the appellant’s request “to establish a unique
    overbreadth standard for the contents of electronic devices.”       Id. at 555.
    Thus, the Grossman standard applies in the physical and digital spheres.
    C
    Two basic approaches to probable cause
    This case requires us to determine how Grossman’s standard requiring
    that the warrant “must describe the items as specifically as is reasonably
    possible” applies to this set of facts. Green illustrates the difficult quandary.
    On the one hand, probable cause to search for evidence contained in a digital
    device like a phone will often require quite broad searches to find items for
    which the authorities have probable cause. But that search, in practice, ends
    up looking a lot like rummaging due to the differences in searching physical
    containers versus digital containers. Green recognized that the authorities
    needed to search everywhere on Green’s computer for evidence of child
    - 27 -
    J-S35011-22
    pornography, as those files can exist anywhere.                 That search could lead
    investigators to discover evidence of other crimes.8
    As an initial matter, we agree with the Commonwealth that some
    aspects of the trial court’s opinion arguably conflict with Green. For example,
    in reviewing Warrant #3, the trial court concluded that “not all items
    requested … were supported by probable cause.”                     Trial Court Opinion,
    8/10/21, at 10. Its opinion identified the request in Warrant #3 to search the
    “use of any applications requiring the use of the phone’s keyboard, including
    text,   photo,   or   video    message         applications,   Internet   browsers,   and
    applications for voice or video calls” on October 13, October 31, and November
    2 of 2019, as particularly problematic. The court concluded that this request
    was “overbroad and unsupported by probable cause” because it is difficult to
    imagine “what application, if any, does not in some way require the use of the
    cellular phone’s keyboard.” Id. at 11. The Commonwealth responds that the
    proper inquiry “is not whether probable cause existed for all applications using
    the keyboard on the phone; rather, it is whether probable cause existed for
    applications using the keyboard on the phone during the time frame sought
    based upon the information in the affidavit.” Commonwealth’s Brief at 26.
    ____________________________________________
    8 Courts have struggled with whether the plain view exception to the warrant
    requirement makes any sense in the digital search context. “A number of
    courts have considered the application of the plain view doctrine in computer
    search cases, and the cases are divided.” State v. Mansor, 
    421 P.3d 323
    ,
    339 (Or. 2018) (collecting cases).
    - 28 -
    J-S35011-22
    We note that some decisions from other jurisdictions have applied a
    “category” approach for smartphone searches. The United States Court of
    Appeals for the Fifth Circuit panel decision in United States v. Morton, 
    984 F.3d 421
     (5th Cir. 2021), overruled on reh’g en banc, United States v.
    Morton, 
    46 F.4th 331
     (5th Cir. 2022), is illustrative and has straightforward
    facts. Morton was stopped for speeding and gave officers consent to search
    his vehicle. That search revealed three cell phones, sixteen ecstasy pills, and
    marijuana, leading to his arrest for drug charges.    Officers also recovered
    “children’s school supplies, a lollipop, 14 sex toys, and 100 pairs of women’s
    underwear in the vehicle,” and based on those items officers suspected that
    “Morton might be a pedophile.”      Id. at 424. Officers applied for a search
    warrant for the three phones; however, the affidavit only sought to recover
    evidence relevant to the drug offenses based on the affiant’s training and
    experience with drug trafficking.    The warrant sought to “search Morton’s
    contacts, call logs, text messages, and photographs for evidence of his drug
    possession crimes.” Id. The warrants were issued and, while searching the
    phones’ photographs, officers saw child sexual-abuse materials.      A second
    warrant was secured, leading to 19,270 images. Morton was then convicted
    of possessing those materials.
    The initial panel determined that the warrant violated the Fourth
    Amendment, as probable cause must exist with respect to each “category” of
    information sought. “As the government properly conceded at oral argument,
    - 29 -
    J-S35011-22
    separate probable cause is required to search each of the categories of
    information found on the cellphones.” Id. at 425 (footnote omitted). The
    panel found that its holding “dovetails with the Fourth Amendment’s
    imperative that the ‘place to be searched’ be ‘particularly describe[ed].’” Id.
    (alterations in original). Thus, the panel viewed the relevant “place” to be
    searched as a particular area of the phone’s digital contents, as opposed to
    the entirety of the phone itself. It concluded that probable cause existed to
    search the “categories” of contacts, call logs, and text messages on the cell
    phone, but not the “category” of photographs. The panel explained that the
    key flaw in the search request was that the officers only had probable cause
    to link Morton to minor possessory offenses, whereas the affiant relied on his
    experience with drug traffickers. The affidavit explained that “criminals often
    take photographs of co-conspirators as well as illicit drugs and currency
    derived from the sale of illicit drugs[.]” Id. at 429 (quoting affidavit).9 The
    panel acknowledged that this assertion might be relevant in a case where
    there was probable cause to establish the individual was a drug trafficker, but
    ____________________________________________
    9 The United States Court of Appeals for the Fifth Circuit heard the case en
    banc and subsequently decided in the government’s favor based on the good
    faith exception to the exclusionary rule, finding that the warrant was not “bare
    bones.” Morton, 46 F.4th at 339. As a result, the panel did not squarely
    address the validity of the warrant. Regarding the original panel’s approach,
    the Morton en banc panel noted that the “categories” concept was relevant
    to the scope of the warrant and whether it was “bare bones.” “Viewing the
    entire affidavit against the broad phone search it authorized, it is borderline
    rather than bare bones.” Id.
    - 30 -
    J-S35011-22
    that was not the case under these facts. See also Burns v. United States,
    
    235 A.3d 758
    , 777–78 (D.C. 2020) (concluding that the affidavit in support of
    the warrant “established probable cause to look for and seize evidence likely
    to be found in at most three narrow categories of data on Mr. Burns’s
    phones”).
    Other courts reject the notion that probable cause must be linked to any
    particular “category.” Those decisions explain that the very nature of digital
    evidence resists easy classification and, thus, requiring the authorities to
    establish probable cause for certain categories of information amounts to an
    ex ante restriction.   This view holds that authorities must be given broad
    discretion to search, because authorities have no way to know what a file
    contains unless they open it.
    Digital evidence also differs from physical evidence in that, for
    most files, there is no way to know what data a file contains
    without opening it, meaning that desired data may be located in
    any part of the digital media or organizational structure. Indeed,
    data stored on a computer hard drive may be physically located
    in multiples places on the drive, and it is unhelpful and often
    inaccurate to think of the data as being located at any particular
    “place” or “places.” In the physical world, a handgun cannot be
    disguised as—and will not be mistaken for—a kitchen table, nor
    will it be found in a pill bottle. But in the virtual world, that kind
    of deception—or error—is possible.           A picture file may be
    intentionally disguised as a text file, for example, by changing the
    extension of the file name or by including the picture in a Microsoft
    Word document, which would be properly saved as a .doc (or
    similar) file. A picture file may contain text information if, for
    example, the picture is of a page of a book. Sophisticated users
    can hide digital data in much more complex ways, including
    changing date and time metadata and encrypting files so that they
    cannot be opened. See Orin S. Kerr, Executing Warrants for
    Digital Evidence: The case for use restrictions on nonresponsive
    - 31 -
    J-S35011-22
    data, 48 Tex. Tech. L. Rev. 1, 16 (2015) (“Data can always be
    changed. Maybe the modification will be easy or maybe it will be
    hard. But it can always be done.”). Similarly, information can be
    hidden unintentionally. Most of us have had the experience of
    neglecting to name or properly “save” a document, only to have
    it disappear into an obscure temporary file, with its sole identifier
    a number assigned by the software. And even those with limited
    computer skills can easily delete their internet search “history” on
    a particular internet browser, although evidence of those searches
    will likely remain elsewhere on the hard drive.          A forensic
    examiner who locates intentionally (or unintentionally) hidden
    information on a computer likely has responded to clues, followed
    instincts, and pursued many dead ends before being
    successful. See Orin S. Kerr, Searches and Seizures in a Digital
    World, 
    119 Harv. L. Rev. 531
    , 545 (2005) (“[G]ood forensic
    analysis is an art more than a science.”).
    State v. Mansor, 
    421 P.3d 323
    , 332 (Or. 2018).
    This approach recognizes that if this type of search occurred in the
    physical world it would be materially indistinguishable from rummaging. The
    Mansor Court held that the proper balance between the legitimate law
    enforcement need to conduct comprehensive searches versus an individual’s
    right to privacy requires suppression of material that does not fall within the
    “particular evidence” as specified within the warrant.
    To satisfy the particularity requirement of Article I, section 9, the
    warrant must identify, as specifically as reasonably possible in the
    circumstances, the information to be searched for, including, if
    available and relevant, the time period during which the
    information was created, accessed, or otherwise used.             We
    acknowledge that, for practical reasons, searches of computers
    are often comprehensive and therefore are likely to uncover
    information that goes beyond the probable cause basis for the
    warrant. In light of that fact, to protect the right to privacy and
    to avoid permitting the digital equivalent of general warrants, we
    also hold that Article I, section 9, prevents the state from using
    evidence found in a computer search unless a valid warrant
    authorized the search for that particular evidence, or it is
    - 32 -
    J-S35011-22
    admissible under an exception to the warrant requirement.
    Id. at 326.
    IV.
    Review of Warrant #3
    We now address the validity of the warrants, starting with Warrant #3.
    A
    No probable cause to search for the majority of items requested
    As Green and Grossman hold, the natural starting point for this inquiry
    is addressing probable cause.    “Consequently, in any assessment of the
    validity of the description contained in a warrant, a court must initially
    determine for what items probable cause existed.      The sufficiency of the
    description must then be measured against those items for which there was
    probable cause.”   Grossman, 555 A.2d at 900.        Initially, we reject the
    Commonwealth’s broad reading of Green. The Commonwealth argues that
    Green makes it clear that the Pennsylvania Constitution imposes
    no per se requirement that a search warrant for a digital device
    be expressly temporally limited, i.e., that the warrant identify
    specific dates associated with the presence of evidence of criminal
    activity on the device. Similarly, there is no per se requirement
    that the warrant be categorically limited; the search warrant need
    not enumerate the exact categories of evidence or particular areas
    of the device -- files or programs -- that may be searched. Rather,
    a search warrant for a digital device with “limiting language
    provided in the warrant and supported by the affidavit of probable
    cause” will meet specificity requirements under the Pennsylvania
    Constitution.
    Commonwealth’s Brief at 21.
    - 33 -
    J-S35011-22
    The Commonwealth appears to interpret Green to say that its
    recognition of the need to conduct a comprehensive search of digital devices
    amounted to a holding that a warrant should be deemed valid provided there
    is probable cause to search the phone at all, where the affidavit contains
    “limiting language” cabining the authorities to searching for evidence of the
    crimes being investigated.
    The Grossman standard asks for which “items” there exists probable
    cause, which is an analytically difficult concept in the digital arena.    The
    requirement that the warrant identify the “item” could be read to mean
    “category,” such that text messages are treated differently than image files.
    The Green Court recognized that digital evidence can be easily disguised or
    hidden.   Green, 265 A.3d at 554 n.6 (“[T]he affidavit also explained how
    easily these files can be hidden, modified, or destroyed, such that the device
    needs to be searched in its entirety by a qualified computer expert in a
    laboratory or controlled environment.”). Thus, an officer executing a warrant
    to search digital evidence cannot determine whether the “items” are present
    unless and until the device is thoroughly searched. Green thus suggests that
    this type of “category” approach is inappropriate, for the reasons discussed in
    Mansor. Moreover, the Commonwealth is correct that Green did not require
    - 34 -
    J-S35011-22
    a temporal limitation, nor did it require the officers to limit their search to any
    particular category of evidence, such as image files.10
    However, we “employ[ ] the principle that the holding of a judicial
    decision is to be read against its facts.” Commonwealth v. Resto, 
    179 A.3d 18
    , 22 (Pa. 2018). The probable cause inquiry asks whether “there is a fair
    probability that contraband or evidence of a crime will be found in a particular
    place.” Barr, 266 A.3d at 40 (citation omitted). The facts in Green involved
    a search of a computer for depictions of child pornography, which are
    themselves contraband. Thus, the materials targeted by the warrant were
    ____________________________________________
    10 Whether Green explicitly rejects the “category” approach in all respects is
    an issue that is ripe for further development. We are unprepared to say that
    the Green Court definitively rejected the categorical approach in all respects.
    It may be the case that child pornography cases are treated differently than
    other investigations for purposes of the “reasonably possible” standard.
    Additionally, as Appellee states in his brief, our Supreme Court has recognized
    that Article I, Section 8 protects a right to privacy that goes beyond the United
    States Constitution. See generally Commonwealth v. Alexander, 
    243 A.3d 177
    , 207 (Pa. 2020) (explaining that Article I, Section 8 “must be read
    in conjunction with more abstract considerations of how far the government
    may encroach on the rights of citizens”).
    We also note that the approach outlined in Mansor is tempered in at least two
    critical ways. First, the tradeoff of permitting the authorities to perform
    expansive searches of digital data is that the discovery of any items that are
    not responsive to the warrant may not be used. Thus, searching for evidence
    of child pornography would require suppression of evidence of drug trafficking.
    Because this case involves an attack on how the warrants were drawn as
    opposed to how it was executed, that issue is not before us. Second, Oregon
    requires that the affidavit of probable cause be specific as to “the information”
    requested and “when it is possible to limit the material searched to a particular
    time period, that period should also be set out in the warrant.” State v. Bock,
    
    485 P.3d 931
    , 935 (Or. App. 2021).
    - 35 -
    J-S35011-22
    illegal to possess. In contrast to Green, the material targeted by the warrant
    in this case was not contraband. Instead, the Commonwealth searched the
    phone for evidence of the crimes.
    Additionally, it is quite difficult to separate the probable cause resolution
    in Green from its analysis of the overbreadth question. In rejecting Green’s
    argument that the probable cause was limited to the particular child
    pornography image downloaded, the Green Court pointed out that the target
    of the investigation was “sharing a collection of child pornography in general,
    which is exactly what the warrant permitted the officers to search for and
    seize.”   Green, 265 A.3d at 554.       Thus, the “item” for which there was
    probable cause was a collection of child pornography, which could be
    anywhere on the device. In that context, a temporal limitation makes little
    sense as the Court’s probable cause calculus did not consider a crime occurring
    over a particular period of time.    Thus, nothing in Green suggests that a
    temporal requirement will never be required.         If a temporal limitation is
    “reasonably possible,” then Grossman demands its inclusion. In short, while
    Green rejected adding more protections to the Grossman standard, the
    baseline level of Grossman still requires more than the Fourth Amendment.
    In this case, we find that there was no probable cause to believe that
    the phone would contain actual evidence of the crimes.           As the Mansor
    approach is more favorable to the Commonwealth, we will accept arguendo
    that it applies here; thus, if the authorities had probable cause to believe the
    - 36 -
    J-S35011-22
    phone contained “items” then the authorities could search the whole phone
    for those items.    The Commonwealth essentially identified four “items” it
    expected to find on Appellee’s phone: what we will refer to as “trophies” (e.g.,
    photos or videos of items Appellee stole and/or the apartments that he
    entered), potential communications about the crimes (as reflected in the
    request to search text messages), location data, and evidence concerning the
    phone’s flashlight usage.
    We begin with the first two of these “items” and conclude that the
    Commonwealth failed to establish probable cause that those items would be
    present on the phone. We find support for this holding in the Supreme Court
    of Pennsylvania’s decision in Johnson, supra, which held that the affidavit
    failed to establish probable cause to justify any search of Johnson’s phones.
    Our Supreme Court had granted review “to consider an issue that is not so
    simple: the permissible scope of … a warrant, under Article I, Section 8 of the
    Pennsylvania Constitution, to search an individual’s cell phone for evidence
    relating to illegal narcotics activity and firearms possession.” Id. at 578. The
    plurality did not resolve that issue because it concluded that the affidavit of
    probable cause failed to support any search of Johnson’s cell phone. In that
    case, police officers were dispatched to a specific apartment due to a 911 call
    of shots fired.    Officers entered and detained five individuals, including
    Johnson. Officers observed, in plain view, two bricks of heroin. They also
    recovered three stolen firearms from the top of the apartment’s hot water
    - 37 -
    J-S35011-22
    tank.    Johnson was arrested and officers seized two cell phones during a
    search incident to arrest. Officers sought a search warrant for Johnson’s cell
    phones, stating in the affidavit the following:
    As a result of the foregoing, your Affiant[s] respectfully request a
    search warrant issued for the black and gray Apple iPhone cellular
    phone and the black Samsung flip cellular telephone listed above,
    as well as any and all electronic and/or digital data contained
    within the cellular telephone or its storage medias/memory cards,
    such as incoming/outgoing calls, call logs, emails, personal
    calendars, cellular internet usage, wireless internet usage, GPS
    data, contact information, text messages, voice mails, notes,
    photographic images, IP addresses, contact information, and
    voice recordings whether or not the electronic and/or digital data
    has been erased, hidden, password protected or encrypted.
    Id. at 580 (quoting affidavit of probable cause).
    The lead Justices expressed skepticism that the phones had any
    connection to the drugs and firearms. “Naturally, one might pause at this
    juncture to wonder, ‘What do appellant’s cell phones have to do with the drugs
    and firearms in the apartment?’” Id. at 581. The Commonwealth’s probable
    cause argument reduced to the proposition that, where “a drug-dealing
    operation was being run out of the apartment in which police encountered [the
    appellant] in the middle of the night, with … multiple cell phones on his person,
    there was at the very least a fair probability that evidence of his involvement
    in that operation would be found in the text messages on those phones.” Id.
    at 586-87 (quoting Commonwealth’s brief; bracketing in original).              The
    plurality rejected the conclusion that probable cause to arrest Johnson for
    constructive possession necessarily supplied probable cause to search his
    - 38 -
    J-S35011-22
    phones. Id. at 587. The affidavit of probable cause must establish a nexus,
    and the plurality found one lacking. The affidavit did not allege that Johnson
    personally possessed, or was even aware of, drugs, guns, or anything else
    related to the criminal activity.     There was “no information about the
    frequency with which [the] appellant visited the apartment or the duration of
    time he was present on the night in question.” Id. at 588. “Simply put, the
    affidavit of probable cause in this case provide[d] little more than the bare
    fact that [the] appellant was present in a place where illegal contraband
    happened to be found.” Id. The Court noted the possibility that an affiant’s
    specialized knowledge set forth in the affidavit could be relevant, but that it
    did not apply “under the particular facts of this case” because nothing in the
    affidavit of probable cause “remotely establish[ed]” that Johnson was a drug
    trafficker as opposed to a guest where drugs were located. Id. That four
    other people were present in the apartment, while the owner was not, was
    additional support for that conclusion.
    As to the warrant’s alleged overbreadth, the plurality determined that
    “the probable cause and overbreadth inquiries are not easily separated; on
    the contrary, as Grossman makes clear, it is impossible to consider an
    overbreadth challenge to a search warrant without taking probable cause into
    account.” Id. at 586. When probable cause is wholly absent, “the warrant is,
    quite literally in some sense, entirely ‘overbroad.’” Id.
    - 39 -
    J-S35011-22
    Johnson provides some guidance on the probable cause inquiry here.
    Just as the lead opinion rhetorically asked what Johnson’s phones had to do
    with the drugs and firearms, one wonders what Appellee’s cell phones had to
    do with the alleged home invasion crimes.           We recognize that, unlike in
    Johnson, there is a stronger basis to conclude Appellee was linked to criminal
    behavior. Whereas the appellant in Johnson was arguably merely present at
    a location where drugs and firearms were kept, the affidavit of probable cause
    in support of Warrant #3 established that Appellee was identified in photo
    lineups by several eyewitnesses, and he was seen on video surveillance exiting
    the apartment.
    But the affidavit in support of Warrant #3 does not, in our view,
    establish sufficient probable cause to conclude that a search of Appellee’s cell
    phone would yield any type of “trophy” evidence relevant to the burglaries or
    criminal trespasses. The probable cause formulation established by Gates
    permits a court to consider “probabilities in particular factual contexts,” and
    courts examining     probable   cause   tend   to    credit,   at least in some
    circumstances, inferences of human behavior related to the crimes at issue.
    See, e.g., Commonwealth v. Lyons, 
    79 A.3d 1053
    , 1065 (Pa. 2013)
    (finding probable cause to support search of murder suspect’s home for
    evidence   where: victim’s co-worker      indicated Lyons        and victim had
    extramarital affair; victim and Lyons were in frequent contact; Lyons went “on
    the run” after murder; and affiant stated that in his experience perpetrators
    - 40 -
    J-S35011-22
    of “gruesome crimes” often leave trace evidence in home); Commonwealth
    v. Torres, 
    177 A.3d 263
    , 275 n.5 (Pa. Super. 2017) (noting that “[s]ome
    federal   courts   have   held   that   it   is   reasonable   to   infer   that   drug
    traffickers will often keep drug-related evidence in their residences and
    businesses”); 
    id. at 278
     (Moulton, J., concurring) (opining that “evidence of
    drug dealing unconnected to a home does not, without more, give probable
    cause to believe that additional contraband will be found in the home”).
    A thorough treatment of this concept is set forth in Commonwealth v.
    Jacoby, 
    170 A.3d 1065
     (Pa. 2017). The affiant applied for a warrant to search
    Jacoby’s home fifteen months after a murder. The Jacoby Court determined
    that the affidavit of probable cause sufficiently established that Jacoby
    committed the homicide, but it failed to establish a basis to search his home
    for the potential murder weapon. The detective’s affidavit in support related
    “that a .32 caliber shell casing was found at the scene of the murder. She
    further indicated that the casing most likely came from a .32 caliber firearm,
    possibly one manufactured by Kel–Tec.”             Id. at 1082.     Jacoby was the
    registered owner of a Kel-Tec .32 caliber firearm. Id. The affidavit further
    related that the weapon sought “is a unique item,” and that Jacoby was a
    convicted felon ineligible to possess a firearm. Id. at 1083. The affidavit
    concluded it was reasonable to believe Jacoby kept the weapon in his home,
    even after that long period of time, as he “was likely to retain the weapon due
    to the difficulty in procuring another one in light of his felon status.” Id. The
    - 41 -
    J-S35011-22
    Court explained that these facts were not sufficient to establish a nexus to
    Jacoby’s home.
    Probable cause to search Jacoby’s home did not exist simply
    because probable cause existed to believe that he had committed
    the murder, with a weapon of the same caliber as one that he
    owned, and then drove in the general direction of his home fifteen
    months before the search warrant was issued. Together and by
    themselves, these factors do not justify entry without some nexus
    to the home. The trial court overlooked the significant gap of time
    between the murder and the search, and then attempted to
    buttress its conclusion with an unsourced assessment of general
    human behavior. Without support, the trial court reasoned that
    people—felons especially—generally do not discard firearms, even
    those used in murders.
    This broad perspective on probable cause finds no support in
    Pennsylvania law and is troubling on several levels. First, the trial
    court deviated from the search jurisprudence summarized above
    without acknowledging or attempting to distinguish it. The trial
    court would hold that, if police officers develop probable cause
    that a person committed an offense anywhere in the
    Commonwealth with a weapon of the same caliber as the one that
    he or she owns, probable cause exists automatically to search that
    person’s home, no matter where it is located. It is easy to discern
    the infirmity of this approach. If the trial court’s reasoning were
    to prevail, when a person commits an offense with such a weapon
    in Erie County, police automatically would have probable cause to
    search that person’s home, even if it is located in Delaware
    County.       This is inconsistent with Fourth Amendment
    jurisprudence.
    Additionally, the trial court’s method for evaluating probable cause
    does not require consideration, in any way, of the time lapse
    between the commission of the offense and the search. Rather
    than addressing the time gap, the trial court would rest upon its
    belief that people generally hold on to guns (even those used in
    murders) and that, as such, probable cause to search for guns
    exists in apparent perpetuity. By this logic, in the case of the Erie
    murder, the trial court would find probable cause to search the
    Delaware County residence not only immediately after the
    murder, but also fifteen months later, and presumably even ten
    years after the crime.
    - 42 -
    J-S35011-22
    Finally, aside from the deviation from the core principles of the
    Fourth Amendment and Article I, Section 8 that necessarily results
    from evaluating probable cause in such general, categorical terms,
    there is another obvious peril in considering probable cause in this
    manner.      People of different genders, races, religions, and
    backgrounds might respond to certain circumstances differently.
    Similarly, older people might not conduct themselves as a younger
    generation would. Mainers might not behave like Texans. There
    is nothing even to suggest that similar people within the same
    general category would respond to a set of circumstances in the
    same way. Probable cause to search Jacoby’s home must be
    evaluated based upon the circumstances of his case, his behavior,
    and any nexus to the location to be searched, but not upon
    categorical assumptions.        Our Constitutions prohibit such
    categorical conclusions, as well as those searches that are based
    upon such conclusions.
    The architects of our Constitutions rejected general searches, and
    instead charged police officers with demonstrating specific and
    articulable facts to establish probable cause that a particular
    person committed a particular crime and that evidence of that
    crime would be found in a particular place. The trial court’s
    approach shortcuts this bedrock inquiry with general assumptions
    about human behavior, untethered to the actual facts at hand,
    and was erroneous. For these reasons, we find an absence of
    probable cause in the warrant to believe that the murder weapon
    would be found in Jacoby’s residence fifteen months after the
    murder.     As such, we need not address Jacoby’s staleness
    argument.
    Id. at 1084–85.
    Jacoby does not appear to completely foreclose some consideration of
    the probability that a particular offender will behave in certain ways with
    respect to assessing whether a sufficient nexus has been established, a point
    underscored by the Green Court’s crediting the affiant’s training and
    experience of how child pornographers generally act. Jacoby does, however,
    hold that categorical assumptions cannot be the sole justification for probable
    - 43 -
    J-S35011-22
    cause.   In that respect, the affidavit here is even weaker than the flawed
    affidavit in Jacoby, because these affidavits did not even attempt to claim
    that home invaders are likely to have used their phones to aid the commission
    of their crimes. To reiterate, it is questionable the extent to which a crime
    like drug trafficking would ever permit a per se inference that a phone would
    contain evidence of drug trafficking. But at least it could be said that the
    “typical” drug trafficker would use their phones in a manner that justifies a
    conclusion that the phone is likely to contain some relevant evidence of drug
    trafficking. There is no obvious link to how a phone would aid the present
    offenses in the same way that drug trafficking does. As reflected in the very
    first warrant application—the suppression of which the Commonwealth does
    not challenge—the affiants merely speculated that the phone may contain
    evidence of the crime. Application for Search Warrant, 11/11/19, at 3 (“Your
    Affiants would like to access [Appellee]’s phone to determine if there are any
    videos that may have recorded the crime, or if [Appellee]’s phone connected
    [to] WiFi at or around the victim’s apartment to determine his location.”).
    We add that in Johnson, the Court reserved the question of whether an
    affiant’s training and experience with drug trafficking could be used to support
    probable cause to search a phone. On this point, the Johnson decision cited,
    inter alia, Commonwealth v. Morin, 
    85 N.E.3d 949
    , 960 (Ma. 2017),
    wherein the Massachusetts Supreme Judicial Court offered “some guidance …
    on the search of cellular telephones.” Id. at 960. “To begin, police may not
    - 44 -
    J-S35011-22
    rely on the general ubiquitous presence of cellular telephones in daily life, or
    an inference that friends or associates most often communicate by cellular
    telephone, as a substitute for particularized information that a specific device
    contains evidence of a crime.” Id.
    We are mindful that Johnson is a plurality decision and not binding.
    However, we deem its logic compelling, as supplemented by the preceding
    discussion. Relying on an assumption that a phone may contain evidence of
    a crime is the type of generic conclusions in place of individual circumstances
    that Jacoby forbids. The fact that Appellee was seen using his cell phone
    establishes little more than his using his phone. The Riley decision declined
    to extend the search incident to arrest exception to the warrant requirement
    to smartphones largely because smartphones are so integral to daily life, a
    phenomenon that has only accelerated in the eight years since Riley. Thus,
    it is quite easy to conjure up reasons why a phone might contain evidence of
    a crime.   “It would be a particularly inexperienced or unimaginative law
    enforcement officer who could not come up with several reasons to suppose
    evidence of just about any crime could be found on a cell phone.” Riley, 573
    U.S. at 399. Riley would amount to a mere paperwork requirement if the
    Commonwealth could obtain a warrant to search a phone based on little more
    than the fact that a citizen carried a phone while committing a crime. Thus,
    the fact that Appellee was seen using his phone in the hallways of the victims’
    - 45 -
    J-S35011-22
    apartments and commented to Deng that he was sending a text message is
    of minimal value.
    The Commonwealth hypothesizes that Appellee may have taken
    photographs or videos during the commission of these crimes. Perhaps, but
    that could be said of any crime, and seeks to enshrine a level of generality in
    place of individual circumstances, which Jacoby forbids.        The phone in
    Johnson could have included text messages establishing that Johnson was
    involved in what looked from the outside to be a drug operation.         As in
    Johnson, the notion that Appellee took evidence of his “trophies” or
    videotaped his crimes rested on pure conjecture. We cannot imagine that, in
    the era before cell phones became a daily part of life, a court would authorize
    a search warrant for a home on the basis that such “trophy” photographs
    would likely be present in a burglary suspect’s home. “[W]hen it comes to the
    Fourth Amendment, the home is first among equals.” Florida v. Jardines,
    
    569 U.S. 1
    , 6 (2013). Riley recognized that records stored on the phone are
    more comprehensive than what would ever be stored in a home. “Indeed, a
    cell phone search would typically expose to the government far more than the
    most exhaustive search of a house[.]” Riley, 573 U.S. at 396 (emphasis in
    original); Green, 265 A.3d at 564 (Wecht, J, dissenting) (“The search of all
    places in a home and all effects located therein is more akin to the search of
    an entire smartphone.”) (emphasis in original).
    - 46 -
    J-S35011-22
    Finally, there is no indication that Appellee was using his phone to
    communicate about the crimes. Some decisions have permitted the search of
    a phone for evidence where specific facts warrant an inference that the phone
    may have some evidence pertinent to the crimes. See Commonwealth v.
    Dorelas, 
    43 N.E.3d 306
    , 312 (Ma. 2016) (holding that there was probable
    cause to search phone for evidence of communications where “the defendant
    had been receiving threatening communications on his iPhone with respect to
    money he owed to ‘people’ and indeed had been using his iPhone while arguing
    with an individual immediately prior to the shooting”). Here, the only evidence
    to hint that Appellee used his phone to communicate are the references to
    Appellee’s using his cell phone in the hallway and telling Deng he would send
    a text message. Given the pervasiveness of cell phone usage in daily life,
    including the use of text messages as a means of communication, we cannot
    conclude that the affidavit’s references to Appellee using his cell phone
    established probable cause to believe the phone contained evidence of the
    home invasion crimes or that Appellee was in contact with potential
    accomplices.   Thus, the warrant was not supported by probable cause to
    support a search of the phone for what we have described as the first two
    “items.” We therefore conclude that, even when viewing the warrant with the
    deference owed to the initial magistrate, there was no substantial basis to
    conclude the phone would contain those items.
    - 47 -
    J-S35011-22
    We thus agree with the trial court that the warrant was defective, albeit
    for slightly different reasons. “[A]s an appellate court, we may affirm on any
    legal basis supported by the certified record.” Commonwealth v. Williams,
    
    125 A.3d 425
    , 433 n.8 (Pa. Super. 2015) (citation omitted); Commonwealth
    v. Parker, 
    249 A.3d 590
    , 593 (Pa. Super. 2021) (addressing potential
    alternative basis for affirmance where Commonwealth appealed).
    B
    Probable cause existed for locational data and flashlight use
    This case is unlike Johnson, however, in that we find that probable
    cause was not wholly absent. While the affidavit failed to establish a nexus
    between the crimes and Appellee’s phone to justify a search for the first two
    types of “items” we previously described, we agree that the affidavit did
    establish probable cause that Appellee possessed the cell phone while
    committing the crimes and that he used the cell phone’s flashlight functionality
    while doing so. Thus, there was probable cause to obtain records concerning
    the phone’s movement and its flashlight usage, and we agree that a properly
    drafted warrant seeking those “items” would have been lawful. Cf. People v.
    Reyes, 
    174 N.E.3d 127
    , 141 (Ill. App. 2020) (stating that “probable cause to
    look for GPS data would not necessarily support a search of all of a cell phone’s
    data”).   Indeed, Appellee indicates that there is a much stronger basis to
    conclude that probable cause existed for these items. See Appellee’s Brief at
    28 (noting that “probable cause might be found” for locational data generated
    - 48 -
    J-S35011-22
    by the phone). This raises the question of whether we may sever the invalid
    portions from the remainder of the warrant.          See Commonwealth v.
    Casuccio, 
    454 A.2d 621
    , 629 (Pa. Super. 1982) (“It would be totally
    unrealistic to invalidate [a] warrant in toto merely because the affiant and
    issuing authority erred in seeking and permitting a search for other items as
    well and we decline to do so.”); see also Commonwealth v. Bagley, 
    596 A.2d 811
    , 824 (Pa. Super. 1991) (explaining that “[t]he doctrine of severance
    mandates that invalid portions of a search warrant may be stricken and the
    remaining portions held valid, as long as the remaining portions of the warrant
    describe with particularity the evidence to be seized”).
    Initially,   we   address   Appellee’s   argument    that   severability   is
    inconsistent with the Pennsylvania Constitution and its broader privacy
    protections. See generally Commonwealth v. Edmunds, 
    586 A.2d 887
    (Pa. 1991) (holding that Pennsylvania Constitution does not recognize good
    faith exception to exclusionary rule); see also Commonwealth v.
    Alexander, 
    243 A.3d 177
    , 183 (Pa. 2020) (“While Edmunds involved an
    application of the exclusionary rule, our holding was tethered to the
    fundamental concern for privacy within our own constitution.”). Appellee also
    points out that the Commonwealth “argues in favor of severance, but never
    addresses the doctrine’s validity or application under the Pennsylvania
    Constitution.” Appellee’s Brief at 43. That charge is correct, and we add that
    our Supreme Court has yet to address this issue. Johnson, 240 A.3d at 591
    - 49 -
    J-S35011-22
    (Saylor, C.J., dissenting) (noting the distinction between whether probable
    cause to search a cell phone exists and the “separate requirement that
    warrants not be overbroad[,]” and “the associated question of severability”).
    Nonetheless, our precedents have accepted the severability doctrine, and we
    decline to announce a departure from federal law in the absence of focused
    briefing on the issue from both parties. Cf. Commonwealth v. Bishop, 
    217 A.3d 833
    , 840 (Pa. 2019) (holding that defendants seeking a new holding
    departing from federal constitutional law must raise the issue in the trial court
    and provide reasons supporting that view). We acknowledge that the doctrine
    has become relevant only on appeal, and Appellee had little incentive to ask
    for a departure when seeking suppression.           By the same token, the
    Commonwealth had no incentive to argue a “compromise” position.              We
    therefore rely on our existing caselaw and apply the doctrine.
    Severability presents a question of law, and we must apply the doctrine
    as if we were the trial court. Here, the Commonwealth asks this Court to
    follow the trial court’s lead with respect to all three warrants. Beginning with
    Warrant #3, the Commonwealth explains that the trial court’s analysis
    “state[d] that ‘not all items’ were supported by probable cause, clearly
    implying that a search for and seizure of some, if not the remainder, of the
    identified items was supported by probable cause.” Commonwealth’s Brief at
    38-39.   It argues that the trial court merely determined that “applications
    using the phone’s keyboard was the sole class of items not supported by
    - 50 -
    J-S35011-22
    probable cause,” and the trial court therefore erred when it “chose to suppress
    the entire warrant” in lieu of conducting a severability analysis. Id. at 39.
    The Commonwealth, however, does not suggest which items should be
    suppressed, perhaps because it does not wish to concede that probable cause
    was lacking in any respect. “The suppression court in this case invalidated
    the entire warrant based upon the conclusion that the search for and seizure
    of one out of five classes of items was unsupported by probable cause, clearly
    in violation of the caselaw regarding severance.” Id. at 40.
    Consistent with our foregoing analysis, which departed from the trial
    court’s analysis in some respects, we find that Warrant #3 was valid only as
    to the recovery of locational data and evidence concerning the phone’s
    flashlight use.
    At this juncture, we address Appellee’s assertion that severability is not
    warranted, as a restriction of the doctrine is that it does not apply to general
    warrants.   See Casuccio, 
    454 A.2d at 630
     (applying severance doctrine
    because “the warrant was not essentially general in character”).       Appellee
    suggests that this warrant was general in character because “the warrants’
    descriptions in this case seeks ‘all’ of broad categories of items without
    limitation.” Appellee’s Brief at 49.
    We disagree. This warrant did not authorize a search of “any and all
    data” on the phone. Warrant #3 specifically delineated several items, and we
    agree with the Commonwealth that the warrant was quite limited in temporal
    - 51 -
    J-S35011-22
    scope, as it was confined to the three known incident dates. We agree that
    those temporal restrictions are relevant and as drawn the warrant did contain
    a check on the officers’ authority. We therefore do not interpret Warrant #3
    as authorizing a general rummaging of Appellee’s phone, except to the extent
    that a comprehensive search is often required due to the distinctions between
    physical and digital searches. We therefore agree with the Commonwealth
    that severability is warranted, and the Commonwealth may lawfully use the
    results of Warrant #3 with respect to locational data and any evidence
    concerning flashlight usage.
    V.
    Warrant #4 and Warrant #5 must be suppressed
    Turning to Warrant #4, the Commonwealth similarly asserts that “this
    warrant contained legitimate support for numerous classes of items which
    were tied to the facts and probable cause listed in the affidavit, on which the
    reviewing magistrate (another Court of Common Pleas Judge) found reason
    to sign the warrant.” Commonwealth’s Brief at 41. Finally, for Warrant #5,
    the Commonwealth suggests that the court “could have deemed fit to
    suppress any information pre-July 2017 if it existed which would have allowed
    the supported time period of July of 2017 onwards to remain intact as properly
    supported. Such a decision would have been a much more proper remedy
    than in toto suppression of the entire warrant.” Id. at 43.
    - 52 -
    J-S35011-22
    Warrant #4 was effectively the same as Warrant #3 in substantive
    terms and differed in the place to be searched, with Warrant #3 targeting the
    phone itself and Warrant #4 authorizing a search of the phone’s iCloud
    backups. Appellee argues that these warrants would not have been executed
    absent the unlawful execution of Warrant #3, and the warrants must therefore
    be suppressed as fruit of the poisonous tree.         “[G]enerally speaking, the
    exclusionary rule applies to evidence that was obtained from a search or
    seizure in violation of the Fourth Amendment. The fruit of the poisonous tree
    doctrine extends the exclusionary rule to render evidence inadmissible which
    was derived from the initially illegally obtained evidence.” Commonwealth
    v. Santiago, 
    209 A.3d 912
    , 916 n.4 (Pa. 2019).
    We agree with Appellee that both warrants must be suppressed in their
    entirety. First, we agree with Appellee that Warrant #4 would not have been
    executed   without   linking   Appellee’s     phone   to   the   iCloud   accounts
    ralphemek@gmail.com and ranlmeks@gmail.com.                 The Commonwealth
    discovered those email addresses during the execution of Warrant #3.
    Application for Search Warrant, 5/22/20, at 4 (explaining that a partial
    extraction and examination of Appellee’s cell phone revealed it was linked to
    those two Apple iCloud accounts).     Similarly, the execution of Warrant #4
    yielded incriminating photographs, which in turn supported Warrant #5.
    There is a common problem to both discoveries: it is not clear how the
    Commonwealth came across this information.            Returning to this Court’s
    - 53 -
    J-S35011-22
    adoption of the severability doctrine, the Casuccio Court cited Professor
    LaFave’s influential search and seizure treatise as supporting the adoption of
    the doctrine. We find persuasive an additional observation from this treatise
    that is pertinent to our analysis:
    It has been correctly noted that the “question of whether this kind
    of surgery might be performed might also depend to some extent
    upon the facts of each case, e.g., how was the warrant executed?”
    This is because the items described in the warrant determine the
    permissible intensity and duration of the search. ... But when
    other objects are seized under authority of the plain view doctrine
    (perhaps those objects insufficiently described in the warrant or
    those objects for which probable cause was not shown in the
    affidavit), a more careful inquiry into the circumstances is
    required. If the items were discovered before those to which the
    warrant was properly addressed were found and while the police
    were looking in places where the latter objects could be located,
    then it may be said that the discovery occurred while executing
    the lawful portion of the warrant. Were the circumstances
    otherwise, then it must be concluded that these other items were
    found during execution of the invalid part of the warrant.
    2 Search and Seizure § 4.6(f) (6th ed.) (footnotes omitted).
    Here, the Commonwealth discovered Appellee’s email addresses during
    the partial extraction of Warrant #3, and then discovered photographs when
    executing Warrant #4. We agree that a search of Appellee’s cell phone per
    Warrant #3 was justified only for locational data and flashlight usage. Thus,
    the email addresses were not proper subjects of the search. Accordingly, we
    must conduct a “more careful inquiry into the circumstances” to determine if
    the Commonwealth was permitted to recover the email addresses, which in
    turn led to the fourth and fifth warrants.
    - 54 -
    J-S35011-22
    We conclude that the answer is no for two related reasons. First, as
    noted supra at note 8, the applicability of the plain view exception to digital
    searches has generated divergent results.         The treatise quoted above
    discusses a search of a physical space, and it is not clear on what basis we
    could decide whether the discovery of the email addresses and the
    incriminating photographs “occurred while executing the lawful portion of the
    warrant.” Id. There was no evidence presented at the evidentiary hearing
    concerning the execution of the warrant. Thus, even if we were inclined to
    apply the “plain view” exception in the digital arena, there is simply no factual
    record on which to test whether the officers exceeded the scope of their
    authority. See Green, 265 A.3d at 555 n.7 (“It should be noted that [Green]
    and amici repeatedly suggest that officers will look through a suspect’s private
    information once a warrant provides a limited scope of access to a personal
    digital device. This, however, is a separate issue than the overbreadth claim
    before us.”). Second, and relatedly, just as we decline to decide Appellee’s
    argument that the Supreme Court of Pennsylvania would reject the
    severability doctrine, we are not prepared to address the difficult question of
    plain view without any advocacy by the parties. The Commonwealth does not
    claim that the plain view exception applies.      Instead, the Commonwealth
    chose to defend the warrants, both before the trial court and on appeal, on
    the basis that they are supported by probable cause, and the Commonwealth
    does not raise any exceptions to the warrant requirement. As our Supreme
    - 55 -
    J-S35011-22
    Court explained in Commonwealth v. Price, 
    284 A.3d 165
    , 173 (Pa. 2022),
    the “inevitable discovery doctrine is not a subsidiary issue to a claim of
    adequate probable cause to support the issuance of a search warrant,” as
    inevitable discovery is an exception to the warrant requirement. Plain view is
    likewise an exception to the warrant requirement.         Commonwealth v.
    McCree, 
    924 A.2d 621
    , 628 (Pa. 2007) (“[U]nder both the Fourth Amendment
    and Article I, § 8, the plain view exception to the warrant requirement requires
    a determination of whether the police have a lawful right of access to the
    object seen in plain view.”). If the record established a clear application of
    the plain view exception, we could perhaps excuse the failure to raise that
    issue on the basis that a severability analysis requires a determination of what
    items were severable on a de novo basis. But there is no caselaw establishing
    that the plain view exception could apply under these circumstances.        We
    therefore decline to consider its application.
    As a result, we apply the severance doctrine to permit only the recovery
    of locational data and usage of the cell phone’s flashlight functions from the
    execution of Warrant #3. The remaining two warrants are suppressed in their
    entirety as fruit of the poisonous tree.11
    ____________________________________________
    11 The Commonwealth obtained locational data during the execution of
    Warrant #3. Application for Search Warrant, 5/22/20, at 4 (“On 4/21/20,
    your Affiant obtained a search warrant. … Off. Lewis’ search of the cell phone
    also found [Appellee]’s cell phone had connected to access points for Wi-Fi
    throughout the ‘W’ building of University Terrace.”).
    - 56 -
    J-S35011-22
    VI.
    Conclusion
    We conclude that Warrant #3 failed to establish probable cause to
    search Appellee’s cell phone for anything other than locational data and usage
    of the cell phone’s flashlight functions. The recovery of those items during
    the execution of Warrant #3 is severable from the defective portions of that
    warrant.
    We affirm the trial court’s ruling suppressing Warrant #4 and Warrant
    #5 on the alternative basis that those warrants are fruit of the poisonous tree.
    The record does not establish any basis for the Commonwealth to search
    Appellee’s iCloud data other than the discovery of his email addresses during
    the execution of Warrant #3. The record further establishes that Warrant #5
    would not have been obtained but for the recovery of incriminating
    photographs during the execution of Warrant #4.        There was no probable
    cause to recover Appellee’s email addresses during the execution of Warrant
    #3, and we decline to apply the plain view exception under these
    circumstances.   We express no opinion on whether that exception applies
    during digital searches. We therefore remand for further proceedings.
    Order affirmed in part, reversed in part, and remanded for further
    proceedings consistent with this opinion. Jurisdiction relinquished.
    - 57 -
    J-S35011-22
    Judgment Entered.
    Joseph D. Seletyn, Esq.
    Prothonotary
    Date: 04/17/2023
    - 58 -