State v. Moore ( 2020 )


Menu:
  •                      THE STATE OF SOUTH CAROLINA
    In The Supreme Court
    The State, Respondent,
    v.
    Robert Lee Moore, Petitioner.
    Appellate Case No. 2017-002479
    ON WRIT OF CERTIORARI TO THE COURT OF APPEALS
    Appeal From Spartanburg County
    R. Keith Kelly, Circuit Court Judge
    Opinion No. 27948
    Heard June 11, 2019 – Filed February 19, 2020
    AFFIRMED AS MODIFIED
    Chief Appellate Defender Robert M. Dudek, of
    Columbia, for Petitioner.
    Attorney General Alan Wilson and Assistant Attorney
    General William M. Blitch Jr., both of Columbia, and
    Seventh Judicial Circuit Solicitor Barry J. Barnette, of
    Spartanburg, all for Respondent.
    JUSTICE KITTREDGE: Following a jury trial, Petitioner Robert Moore was
    sentenced to thirty years' imprisonment for the attempted murder of Travis Hall.
    Hall was shot in the head and left for dead in a vehicle in a Taco Bell parking lot
    following a drug deal gone wrong. In the immediate aftermath of the shooting, law
    enforcement officers found three cell phones, including one later identified as
    Petitioner's "flip phone," 1 in the area of the driver's floorboard after emergency
    medical personnel removed Hall from the vehicle.2 Without obtaining a warrant,
    the officers removed the cell phones' subscriber identity module (SIM) cards to
    determine ownership. The officers then obtained a warrant to search the contents
    of Petitioner's flip phone. Petitioner's subsequent motion to suppress all evidence
    acquired from the flip phone was denied, as the trial court found Petitioner had
    abandoned his phone. A divided court of appeals' panel affirmed Petitioner's
    conviction on the basis of inevitable discovery. State v. Moore, 
    421 S.C. 167
    , 
    805 S.E.2d 585
    (Ct. App. 2017). We granted a writ of certiorari to review the decision
    of the court of appeals and now affirm as modified.
    I.
    On February 25, 2013, Spartanburg County Sheriff's Office deputies were
    dispatched to a "shots fired" call at a Taco Bell. The first officer to arrive on the
    scene found Hall shot in the head, hanging out of his vehicle while partially
    restrained by the seatbelt. Despite the severity of his injuries, Hall survived.
    Witnesses told law enforcement that a white Chrysler 300 with "some rather large
    [and distinctive] rims" fled the scene immediately after the shooting.
    Deputies at the crime scene recovered three cell phones from Hall's vehicle. The
    phones were immediately given to an investigator, who removed the SIM cards to
    obtain the phone number associated with each phone. A Spartanburg County
    Sheriff's Office database identified one phone number as belonging to Petitioner,
    who had given law enforcement that number three months prior in connection with
    obtaining a surety bond. An investigator with the Sheriff's Office then listed (1)
    the flip phone's phone number obtained from the SIM card; (2) Petitioner's name;
    and (3) the circumstances under which the phone was found, ultimately securing a
    1
    While a "smart phone" is "a cell phone with a broad range of other functions
    based on advanced computing capability, large storage capacity, and Internet
    connectivity," a flip phone is "a kind of phone that is flipped open for use and that
    generally has a smaller range of features than a smart phone." Riley v. California,
    
    573 U.S. 373
    , 379, 380 (2014).
    2
    The other two cell phones were later identified as Hall's.
    search warrant to examine the contents of the flip phone. The search revealed that
    five calls were made from Petitioner's phone to the victim's phone in the hour prior
    to the shooting.
    Meanwhile, in a separate portion of the investigation unrelated to the flip phone or
    search warrant, law enforcement officers identified the getaway vehicle and its two
    occupants—Petitioner and his co-defendant Tevin Thomas—via eyewitness
    testimony and video recording. Thomas was subsequently apprehended, initially
    denying he was present at the scene of the crime. However, after an officer
    confronted him with the video recording of Thomas and Petitioner at a nearby gas
    station—driving, within minutes of the shooting, the distinctive getaway car
    described by witnesses at the crime scene—Thomas made a second statement
    naming and implicating Petitioner in the shooting. Petitioner was arrested and
    charged with attempted murder.
    Pursuant to the Fourth Amendment to the United States Constitution and Riley v.
    California, 3 Petitioner made a pre-trial motion to suppress any evidence seized
    from the warrantless examination of his phone's SIM card. Finding Petitioner had
    abandoned his cell phone, the trial court denied the motion. On appeal, a majority
    of the court of appeals' panel affirmed on the ground of inevitable discovery. A
    dissenting member of the panel voted to reverse the trial court, relying on Riley and
    contending that the warrantless examination of the SIM card constituted a Fourth
    Amendment violation. We granted a writ of certiorari to review the divided court
    of appeals' decision.
    II.
    On appeals involving a motion to suppress based on Fourth Amendment grounds,
    appellate courts apply a deferential standard of review and will reverse only in
    cases of clear error. State v. Cardwell, 
    425 S.C. 595
    , 599–600, 
    824 S.E.2d 451
    ,
    453 (2019). The "clear error" standard means appellate courts may not reverse the
    trial court's findings of fact merely because they would have decided the case
    differently. State v. Moore, 
    415 S.C. 245
    , 251, 
    781 S.E.2d 897
    , 900 (2016)
    (citation omitted). Rather, in reviewing Fourth Amendment cases, appellate courts
    must affirm the trial court's ruling if there is any evidence to support it. Robinson
    v. State, 
    407 S.C. 169
    , 181, 
    754 S.E.2d 862
    , 868 (2014).
    3
    
    573 U.S. 373
    (2014).
    III.
    The State primarily contends that the limited warrantless search of Petitioner's cell
    phone was entirely reasonable under the circumstances. We agree. The Fourth
    Amendment provides, "The right of the people to be secure in their persons,
    houses, papers, and effects, against unreasonable searches and seizures, shall not
    be violated . . . ." U.S. Const. amend. IV (emphasis added). It has long been
    recognized that the touchstone of the Fourth Amendment is reasonableness. 
    Riley, 573 U.S. at 381
    –82 (quoting Brigham City v. Stuart, 
    547 U.S. 398
    , 403 (2006));
    Florida v. Jimeno, 
    500 U.S. 248
    , 250 (1991) (citing Katz v. United States, 
    389 U.S. 347
    , 360 (1967)).
    The trial court denied the motion to suppress on the basis of abandonment.
    Arguably, some evidence supports the trial court's finding that Petitioner
    abandoned his flip phone. Cf. State v. Brown, 
    423 S.C. 519
    , 525, 
    815 S.E.2d 761
    ,
    764–65 (2018) (finding a defendant abandoned his cell phone at the scene of the
    crime and explaining the defendant made no attempt to call or send text messages
    to the phone to see if someone would answer; the defendant did not attempt to
    contact the service provider for information on the whereabouts of the phone; and
    the defendant did not go back to the scene of the crime to look for the phone or call
    the police to see if they had it); 
    Robinson, 407 S.C. at 181
    , 754 S.E.2d at 868
    (setting forth the deferential "any evidence" standard of review). Yet we
    acknowledge a close question is presented on the issue of abandonment. We elect
    to resolve this appeal on other grounds.4
    4
    We note the dissent focuses much of its analysis on abandonment, on which we
    have expressly declined to rule. As a result, we view much of the dissent's analysis
    as non-responsive. We additionally note it does not appear as simple as the
    dissent's contention that "Riley created a categorical rule that, absent exigent
    circumstances, law enforcement must procure a search warrant before searching
    the data contents of a cell phone." (second emphasis added) (quoting 
    Brown, 423 S.C. at 531
    , 815 S.E.2d at 767 (Beatty, C.J., dissenting)). Rather, other courts have
    found the abandonment exception, as well as other exceptions, may continue to
    justify a warrantless search of a cell phone, even post-Riley. See, e.g.,
    Commonwealth v. Kane, 
    210 A.3d 324
    , 329–32 (Pa. Super. Ct. 2019) (affirming
    the trial court's finding that a cell phone was abandoned and that law enforcement
    therefore permissibly executed a warrantless search), cert. denied, 
    218 A.3d 856
    (Pa. 2019) (per curiam).
    The Fourth Amendment, as interpreted, requires that the actions of law
    enforcement be viewed through a lens of reasonableness. The reasonableness
    inquiry is fact specific and context dependent. Here, law enforcement limited the
    warrantless portion of their search of the three phones to the SIM cards alone in an
    effort to establish ownership, which—as will be explained in more detail below—
    is a search wholly distinct from examining the contents of the phones. Moreover,
    at the time of the warrantless portion of the search to discover the identities of the
    cell phones' owners, law enforcement officers were responding to an active crime
    scene, not knowing the identity and whereabouts of the shooter. The public safety
    concerns are self-evident. Under the circumstances presented, we hold the limited
    search of the SIM cards to identify the phone numbers was reasonable and in no
    manner constituted an unreasonable search or seizure.
    A.
    A SIM card is a small device which contains a customer's basic information, along
    with encryption data to allow a device to access a particular carrier's mobile
    network. Thus, in many ways, a SIM card is simply a key to a specific mobile
    network. However, a SIM card is not part of a phone. This is evidenced by the
    facts that (1) not all phones have SIM cards; (2) SIM cards may be transferred
    from one phone to another; and (3) a single phone can utilize a series of SIM cards
    to easily change the phone's number and subscriber information. See, e.g., United
    States v. Flores-Lopez, 
    670 F.3d 803
    , 810 (7th Cir. 2012) (explaining people may
    purchase multiple prepaid SIM cards, "each of which assigns a different phone
    number to the cell phone in which the card is inserted," making it easy for a single
    phone to be associated with multiple phone numbers), abrogated on other grounds
    by 
    Riley, 573 U.S. at 400
    ; In re Apple iPhone Antitr. Litig., 
    874 F. Supp. 2d 889
    ,
    892 n.5 (N.D. Cal. 2012) ("A SIM card is a removable card that allows phones to
    be activated, interchanged, swapped out and upgraded. The SIM card is tied to the
    phone's network, rather than to the physical phone device itself." (internal citations
    omitted)).
    Given its purpose of identifying a phone to a particular mobile network, a SIM
    card contains limited storage capacity. It therefore never contains the vast majority
    of the information available on an unlocked cell phone. See Sigram Schindler
    Beteiligungsgesellschaft mbH v. Cisco Systems, Inc., 
    726 F. Supp. 2d 396
    , 413
    n.27 (D. Del. 2010) ("Generally, a SIM card is a smart card that encrypts voice and
    data transmissions and stores data about a user for identification purposes."
    (emphasis added)); see also United States v. Wicks, 
    73 M.J. 93
    , 97 (C.A.A.F. 2014)
    (explaining that a witness initially attempted to turn over only the SIM card of a
    suspect's cell phone, but "the SIM card did not contain any [useful] information,"
    so the witness eventually turned over the suspect's entire cell phone, which did
    contain the incriminating information for which law enforcement was looking).5
    According to one witness at trial, the SIM card on this particular type of older
    model flip phone "primarily contains the assigned cell phone number," but can also
    contain incomplete records of the contacts stored on the phone as well as partial
    call and text logs. A SIM card does not store call or text logs in reverse
    chronological order but, rather, randomly if at all. We conclude searching a SIM
    card is fundamentally distinct from searching the full contents of an unlocked cell
    phone, making much of the language in Riley concerning the privacy implications
    for searching a cell phone inapplicable or, at best, greatly diminished here.6
    B.
    As explained previously, "the ultimate measure of the constitutionality of a
    government search is reasonableness." Vernonia Sch. Dist. 47J v. Acton, 
    515 U.S. 646
    , 652 (1995) (internal quotation marks omitted). However, "a warrant is not
    required to establish the reasonableness of all government searches." 
    Id. at 653.
    For example, law enforcement officers may search lost property to safeguard the
    property, protect the police department from false claims, and protect the police
    5
    The dissent disagrees with our recitation of the functionality of a SIM card,
    resorting to an internet search well outside the record on appeal and citing to a
    website from www.wisegeek.com titled "What is a SIM card?" We could similarly
    surf the internet to find information counter to the dissent, but decline to do so
    given the functionality of a SIM card is adequately set forth in the case law cited
    above.
    6
    Due to the fact that a SIM card's storage is both incomplete and random, we
    strongly disagree with the dissent's argument that we should view SIM cards as
    functionally equivalent to flash drives, whose contents are generally protected by
    the Fourth Amendment. In the case of a flash drive, the user deliberately chooses
    which information to place on the drive, and destroying the drive destroys access
    to the information placed on it. In contrast, a cell phone owner does not choose
    which information is (or is not) stored on his SIM card, and destroying the SIM
    card does not destroy access to the (incomplete) information stored therein because
    the full data is duplicated on the phone itself or, at worst, on the provider's servers.
    Thus, searching the contents of a SIM card is fundamentally distinct from
    searching either a flash drive or the full contents of an unlocked cell phone. The
    privacy implications of searching the digital data contained on SIM cards, flash
    drives, and unlocked cell phones are likewise distinct.
    from danger. South Dakota v. Opperman, 
    428 U.S. 364
    , 369 (1976). Likewise,
    "[w]hen containers have been turned over to the police, an officer 'may validly
    search lost property to the extent necessary for identification purposes.'" United
    States v. Wilson, 
    984 F. Supp. 2d 676
    , 683–86 (E.D. Ky. 2013) (quoting State v.
    Ching, 
    678 P.2d 1088
    , 1093 (Haw. 1984)) (holding officers acted reasonably in
    searching a suitcase and the laptop found inside in order to identify the owner);
    State v. Polk, 
    78 N.E.3d 834
    , 843 (Ohio 2017) ("[A] person retains a reasonable
    expectation of privacy in a lost item, 'diminished to the extent that the finder may
    examine the contents of that item as necessary to determine the rightful owner.'"
    (quoting State v. Hamilton, 
    67 P.3d 871
    , 875 (Mont. 2003))); see also People v.
    Juan, 
    221 Cal. Rptr. 338
    , 341 (Ct. App. 1985) (finding law enforcement's search
    through the pockets of a jacket left hanging on the back of a restaurant chair at an
    empty table was reasonable because the defendant had no reasonable expectation
    of privacy under those circumstances, and explaining in part, "Indeed, an
    individual who leaves behind an article of clothing at a public place most likely
    hopes that some Good Samaritan will pick up the garment and search for
    identification in order to return it to the rightful owner.").
    Here, the Spartanburg County Sheriff's Office investigator conducted a limited
    search of the cell phones found at the crime scene for the targeted purpose of
    determining the owner. Importantly, he did so by searching only the phones' SIM
    cards, not the contents of the phones—despite the fact that the flip phone was not
    password protected—and the search lasted a single minute.7 Once the investigator
    identified the owners of the cell phones, a warrant was obtained to search
    Petitioner's flip phone. Under these circumstances, the limited search of the SIM
    cards for purposes of identification was reasonable and did not contravene the
    Fourth Amendment. Cf. State v. Green, 
    164 So. 3d 331
    , 344 (La. Ct. App. 2015)
    (holding an officer's removal of a cell phone's battery to acquire the identifying
    subscriber number (analogous to a serial number) did not implicate the Fourth
    Amendment because the subscriber had no "reasonable expectation of privacy in
    the serial number of his cell phone or other identifying information"). The
    determination of whether a search is permissible should not be the result of varying
    7
    Aside from Petitioner's phone number (which was used to obtain his name), the
    warrantless portion of the search of the flip phone's SIM card revealed thirty-four
    contacts and three text messages that had been sent in the year prior to the
    shooting. Petitioner does not argue the contact entries or text messages were
    relevant to the shooting or otherwise led law enforcement officers to discover his
    identity or suspect his involvement.
    frameworks depending on whether the person who lost the item is a criminal
    hoping to avoid detection or a law-abiding citizen hoping for the return of the lost
    item. To the extent Petitioner retained an expectation of privacy in his cell phone
    left next to the victim's body, that expectation of privacy was diminished to the
    point that the finder could properly examine the item in a manner limited to
    determining the owner. Cf. State v. Hill, 
    789 S.E.2d 317
    , 319 (Ga. Ct. App. 2016)
    (holding the police properly obtained the defendant's cell phone number and name
    in a case in which the defendant left his cell phone at the scene of a crime, and the
    police used the phone to call 911 in order to get the phone number from the 911
    dispatcher; and explaining, "While the application of Fourth Amendment law to
    this precise set of facts appears to be an issue of first impression in Georgia, there
    are many cases in Georgia and in other jurisdictions supporting the conclusion that
    a person lacks a legitimate expectation of privacy in identifying information such
    as name, address, or telephone number that is used to facilitate the routing of
    communications by methods such as physical mail, e-mail, landline telephone, or
    cellular telephone." (collecting cases)); 
    id. at 321
    ("[W]e do not construe Riley to
    recognize a legitimate expectation of privacy in identifying noncontent information
    such as the person's own phone number, address, or birthdate, simply because that
    information was associated with a cellular phone account rather than a landline
    phone account or a piece of physical mail.").
    IV.
    Of course, we recognize the adage "get a warrant" will always be at play in these
    Fourth Amendment challenges. We join that chorus as well, as it is always
    preferable to "get a warrant." However, the question before us is not whether
    obtaining a warrant would have been preferable; rather, the question here is
    whether obtaining the phone numbers assigned to the SIM cards without a warrant
    under these circumstances contravened the Fourth Amendment. As explained
    previously, we hold law enforcement's identification of the number assigned to the
    flip phone by examining the SIM card was reasonable and did not violate the
    Fourth Amendment.
    Were we, however, to accept the premise of Petitioner's argument regarding a
    Fourth Amendment violation, his conviction would nevertheless be upheld because
    the absence of a warrant does not require the categorical suppression of evidence
    as advocated by Petitioner. See Herring v. United States, 
    555 U.S. 135
    , 140 (2009)
    ("The fact that a Fourth Amendment violation occurred—i.e., that a search or arrest
    was unreasonable—does not necessarily mean that the exclusionary rule applies.").
    "Indeed, exclusion has always been our last resort, not our first impulse." 
    Id. (quoting Hudson
    v. Michigan, 
    547 U.S. 586
    , 591 (2006)) (internal quotation marks
    omitted); see also Davis v United States, 
    564 U.S. 229
    , 237 (2011) (explaining
    suppression can be a harsh sanction, for it "exacts a heavy toll on both the judicial
    system and society at large").
    The purpose of the exclusionary rule is to deter law enforcement officers from
    committing Fourth Amendment violations. 
    Davis, 564 U.S. at 236
    –37. As a
    result, when suppression will fail to yield "appreciable deterrence," exclusion is
    clearly unwarranted. 
    Id. at 237
    (quoting United States v. Janis, 
    428 U.S. 433
    , 454
    (1976)). "To that end, courts have recognized several exceptions to the
    exclusionary rule," including, among others, the independent source doctrine,
    inevitable discovery, and good-faith reliance. See State v. Adams, 
    409 S.C. 641
    ,
    647 & n.3, 
    763 S.E.2d 341
    , 345 & n.3 (2014) (collecting cases). We find that—
    even if law enforcement committed a Fourth Amendment violation by searching
    the SIM cards for identification purposes—each of these three exceptions applies,
    rendering the exclusionary rule inappropriate in this instance.
    A.
    Previously, this Court explained the independent source exception as follows:
    The "fruit of the poisonous tree" doctrine provides that evidence must
    be excluded if it would not have come to light but for the illegal
    actions of the police, and the evidence has been obtained by the
    exploitation of that illegality. However, the challenged evidence is
    admissible if it was obtained from a lawful source independent of the
    illegal conduct.
    State v. Copeland, 
    321 S.C. 318
    , 323, 
    468 S.E.2d 620
    , 624 (1996) (internal citation
    omitted).
    Here, in a portion of the investigation wholly unrelated to or affected by the cell
    phones, law enforcement obtained incriminating video from a nearby gas station
    located approximately one-and-a-half miles from the Taco Bell where the victim
    was shot. The video—taken around three to five minutes after the shooting—
    showed Petitioner and Thomas driving the distinctive getaway vehicle into the
    parking lot and loitering around the car for several minutes while police cars drove
    past the gas station with their blue lights flashing and sirens blaring. Petitioner and
    Thomas then grabbed a bag from the car and threw it in the trash before entering
    the gas station. Inside, Petitioner bought a package of cigarettes, which caused
    him to have to give his (real) date of birth, and the sales clerk dutifully noted the
    birthdate on a receipt that was later introduced at trial. Other video recordings
    introduced at trial showed Petitioner and Thomas in the getaway vehicle driving it
    towards the location where it was subsequently found by law enforcement that
    same night—the house of a relative of Petitioner.
    The Sheriff's Office investigators could not recall exactly when they identified
    Thomas as the second man in the video recordings; however, they located and
    arrested him on February 26, one day after the shooting.8 Thomas initially denied
    being at the Taco Bell at all on February 25. However, an investigator confronted
    Thomas with a picture of Thomas at the gas station after the shooting, and Thomas
    recanted his non-involvement, giving a second written statement. In this second
    statement, Thomas named Petitioner as the second man involved.
    At trial, Thomas testified Petitioner had called Hall, the victim, multiple times
    directly before the shooting in order to set up a meeting (a drug deal). 9 However,
    Thomas and Petitioner had prearranged to rob Hall at the meeting and armed
    themselves accordingly. Thomas stated that as soon as Petitioner climbed into
    Hall's car for the drug deal, Petitioner pulled out a gun, and the two men started
    "tussling real heavy." Eventually, Petitioner shot Hall, jumped back into the
    getaway vehicle, and drove off against traffic and over the median, nearly hitting a
    pedestrian on the way out of the parking lot.
    We conclude that none of this evidence "has been come at by exploitation of [any
    possible] violation of [Petitioner's] Fourth Amendment rights." See United States
    v. Crews, 
    445 U.S. 463
    , 471 (1980) (quoting Wong Sun v. United States, 
    371 U.S. 471
    , 488 (1963)) (internal quotation marks omitted). We find Petitioner's identity
    and the possible presence of incriminating call logs on Hall's and Petitioner's cell
    phones came from an independent source in the investigation untainted by any
    alleged Fourth Amendment violation. Cf. 
    id. at 474
    ("Insofar as respondent
    challenges his own presence at trial, he cannot claim immunity from prosecution
    simply because his appearance in court was precipitated by [a Fourth Amendment
    violation]. [A Fourth Amendment violation], without more, has never been viewed
    as a bar to subsequent prosecution, nor as a defense to a valid conviction. The
    8
    This is the same day the magistrate signed the warrant allowing the investigators
    to examine the contents of Petitioner's flip phone.
    9
    At least one other witness confirmed Hall had received a series of phone calls
    attempting to set up a meeting with him before the shooting. That witness was of
    the impression that Hall knew the person calling him. While Petitioner and Hall
    were longstanding friends, Hall was not acquainted with Thomas.
    exclusionary principle of Wong Sun and Silverthorne Lumber Co.[10] delimits what
    proof the Government may offer against the accused at trial, closing the courtroom
    door to evidence secured by official lawlessness. Respondent is not himself a
    suppressible 'fruit,' and the illegality of his detention [due to a Fourth Amendment
    violation] cannot deprive the Government of the opportunity to prove his guilt
    through the introduction of evidence wholly untainted by the police misconduct."
    (footnote omitted) (internal citations omitted)); 
    id. at 478–79
    & n.* (White, J.,
    concurring) (rejecting, in a portion of his concurrence that received a majority vote
    of the Justices on the United States Supreme Court, the notion that a defendant's
    face or identity can be considered evidence suppressible for no other reason than
    the defendant's presence in the courtroom is the fruit of a Fourth Amendment
    violation (citing Frisbie v. Collins, 
    342 U.S. 519
    , 522 (1952))).11
    B.
    "[T]he inevitable discovery doctrine provides that illegally obtained information
    may nevertheless be admissible if the prosecution can establish by a preponderance
    of the evidence that the information would have ultimately been discovered by
    lawful means." 
    Cardwell, 425 S.C. at 601
    , 824 S.E.2d at 454 (citing Nix v.
    Williams, 
    467 U.S. 431
    , 444 (1984)). Here, after receiving a "shots fired" call, law
    enforcement officers found Hall shot in the head and three cell phones on the
    floorboard at his feet. Correctly suspecting that it would have been highly unusual
    for all three phones to belong to Hall, investigators took action to identify the cell
    phones' owners and determine if there was a connection between the phones, first
    by searching the SIM cards and then by obtaining a warrant to examine the
    contents of the phones. While the officers obtained the call logs between the two
    phones by executing the warrant on Petitioner's flip phone, they could have also
    obtained the same information by searching Hall's phones, which they had in their
    lawful possession. Particularly given the fact that other portions of the
    investigation revealed that, prior to driving to the Taco Bell, Hall had been phoned
    10
    Silverthorne Lumber Co. v. United States, 
    251 U.S. 385
    (1920).
    11
    In focusing on the abandonment issue, the dissent does not address all of the
    bases we discuss in reaching our decision, namely, the independent source
    doctrine. In fact, the gas station video and Thomas's confession were the key
    pieces of evidence against Petitioner, not the flip phone or its call logs. While the
    testimony about the phone helped confirm various aspects of some witnesses'
    testimony, the phone's call logs and its role in revealing Petitioner's involvement in
    the crime were purely cumulative.
    multiple times in the presence of witnesses and seemed to be setting up a meeting
    in the hour prior to his shooting, we find the State established that law enforcement
    was keyed into and actively investigating Hall's phone records and would have
    obtained the call logs regardless of the search of Petitioner's phone. Obtaining the
    call logs—including Petitioner's five calls to Hall in the hour prior to the
    shooting—would have allowed the investigators to obtain Petitioner's phone
    number and run it through their internal database (as actually occurred), thus
    giving them Petitioner's name. As a result, we find the evidence Petitioner seeks to
    have suppressed would have been inevitably discovered, and we therefore find the
    exclusionary rule inapplicable here because it would not sufficiently deter police
    conduct in the future. See 
    Nix, 467 U.S. at 444
    ("If the prosecution can establish
    by a preponderance of the evidence that the information ultimately or inevitably
    would have been discovered by lawful means . . . then the deterrence rationale has
    so little basis that the evidence should be received. Anything less would reject
    logic, experience, and common sense." (footnote omitted)).
    C.
    Finally, it is beyond dispute that law enforcement in this case acted in good faith.
    Even accepting the premise of Petitioner's Fourth Amendment challenge, none of
    the purposes served by the exclusionary rule would be achieved by suppressing
    any of the evidence obtained from searching his cell phone. See United States v.
    Leon, 
    468 U.S. 897
    , 907–08 (1984) ("The substantial social costs exacted by the
    exclusionary rule for the vindication of Fourth Amendment rights have long been a
    source of concern. Our cases have consistently recognized that unbending
    application of the exclusionary sanction to enforce ideals of governmental rectitude
    would impede unacceptably the truth-finding functions of judge and jury. An
    objectionable collateral consequence of this interference with the criminal justice
    system's truth-finding function is that some guilty defendants may go free or
    receive reduced sentences as a result of favorable plea bargains. Particularly when
    law enforcement officers have acted in objective good faith or their transgressions
    have been minor, the magnitude of the benefit conferred on such guilty defendants
    offends basic concepts of the criminal justice system." (emphasis added) (footnote
    omitted) (internal citations omitted) (internal quotation marks omitted)).
    Petitioner, as did the dissenting opinion in the court of appeals, relies principally
    on the United States Supreme Court's Riley v. California decision from 2014,
    which emphasized the degree of governmental intrusion resulting from warrantless
    searches of cell phones incident to an arrest due to the wealth of private
    information contained within modern cell phones. Notably, when law enforcement
    responded to the Taco Bell in Spartanburg County on February 25, 2013, Riley had
    not yet been decided. At the time, the law was far from settled in terms of the
    necessity of obtaining a warrant to search a cell phone, much less a SIM card
    alone. 12 See 
    id. at 919
    ("If the purpose of the exclusionary rule is to deter unlawful
    police conduct, then evidence obtained from a search should be suppressed only if
    it can be said that the law enforcement officer had knowledge, or may properly be
    charged with knowledge, that the search was unconstitutional under the Fourth
    Amendment." (emphasis added) (quoting United States v. Peltier, 
    422 U.S. 531
    ,
    542 (1975))). Finally, it must be remembered that law enforcement did obtain a
    warrant to search Petitioner's phone once his identity as owner was determined.
    IV.
    For the foregoing reasons, the judgment of the court of appeals is affirmed as
    modified.
    AFFIRMED AS MODIFIED.
    FEW and JAMES, JJ., concur. HEARN, J., concurring in part and dissenting
    in part in a separate opinion. BEATTY, C.J., dissenting in a separate opinion.
    12
    In fact, the law is still far from settled regarding the propriety of searching a SIM
    card alone, rather than the full contents of a cell phone. We have found little case
    law on the constitutionality of such searches, as much of the relevant case law
    either (1) appears to have been decided post-Riley; (2) is distinguishable because it
    involves searches of cell phone contents and not SIM card contents; or (3) more
    commonly, reflects both of these problems.
    JUSTICE HEARN: I concur with the majority to affirm Moore's conviction based
    upon the inevitable discovery and independent source doctrines. Thus, regardless of
    whether there was a Fourth Amendment search—which I believe there was—the
    exclusionary rule would not apply. However, even though Moore cannot avail
    himself of this remedy, I part company with the majority's discussion of the good-
    faith exception as a basis for declining to apply the exclusionary rule.
    The good-faith exception ensures that evidence will not be suppressed when
    law enforcement acts in an objectively reasonable manner. The purpose of the
    exclusionary rule is deterrence, and this consideration must be weighed against the
    social costs of excluding relevant, incriminating evidence. Hudson v. Michigan, 
    547 U.S. 586
    , 599 (2006) (noting the "substantial social costs" of the exclusionary rule).
    We have previously addressed this exception in analyzing whether binding
    precedent supported law enforcement's warrantless search. State v. Adams, 
    409 S.C. 641
    , 652, 
    763 S.E.2d 341
    , 347 (2014). In Adams, police attached a GPS device to
    the defendant's vehicle and monitored his movements, suspecting he was
    transporting drugs. Police tracked Adam's vehicle and conducted a stop on the
    interstate, where an officer discovered cocaine. Adams filed a motion to suppress
    the evidence, which the trial court denied. We reversed, and in doing so, rejected the
    contention that law enforcement acted in good faith based on purported precedent
    supporting the warrantless search. The State relied on two cases—United States v.
    Knotts, 
    460 U.S. 276
    , 281 (1983) (holding law enforcement's placement of a beeper
    in a container of chloroform with the seller's consent and their subsequent
    monitoring did not constitute a search under the Fourth Amendment because
    individuals do not possess a reasonable expectation of privacy in traveling on public
    highways), and United States v. Karo, 
    468 U.S. 705
    , 713 (1984) (holding the
    placement of an electronic beeper in a container with the owner's consent before
    being sold did not constitute a search because the buyer's privacy interests were not
    infringed when he received possession of the container). We also noted a statute
    required police to procure a warrant before installing and monitoring a GPS device.
    S.C. Code Ann. § 17-30-140 (2014). In addressing the good-faith exception, we
    rejected the State's argument that Knotts and Karo constituted binding precedent that
    permitted law enforcement to install and monitor GPS devices without a warrant.
    Our focus in Adams concerned whether binding precedent supported the
    warrantless search. That made sense because the default is that a search without a
    warrant is unreasonable. State v. Weaver, 
    374 S.C. 313
    , 319, 
    649 S.E.2d 479
    , 482
    (2007) ("Generally, a warrantless search is per se unreasonable and violates the
    Fourth Amendment prohibition against unreasonable searches and seizures.").
    While we will not penalize law enforcement by suppressing evidence obtained when
    police follow precedent, that is not the case here. Indeed, even the majority
    characterizes the state of the law as "far from settled," which obviously is short of
    controlling precedent. In light of the unsettled nature of our case law, I believe our
    Fourth Amendment jurisprudence requires this fact to militate in favor of requiring
    a warrant. Nevertheless, because I agree that the inevitable discovery and
    independent source doctrines apply, the exclusionary rule has no bearing in this case.
    CHIEF JUSTICE BEATTY: I respectfully dissent. I would reverse the
    decision of the court of appeals and remand Moore's case for a new trial. In my
    view, the warrantless removal of the SIM card and forensic examination of its digital
    contents constituted a search in violation of the Fourth Amendment. Accordingly, I
    would find the trial court erred in denying Moore's motion to suppress.
    I.
    The Fourth Amendment to the United States Constitution protects a person's
    right to be free from unreasonable searches and seizures. U.S. Const. amend. IV.
    "Warrantless searches and seizures are unreasonable absent a recognized exception
    to the warrant requirement." State v. Brown, 
    401 S.C. 82
    , 89, 
    736 S.E.2d 263
    , 266
    (2012) (citation omitted). The State bears the burden of establishing "the existence
    of circumstances constituting an exception to the general prohibition against
    warrantless searches and seizures." State v. Gamble, 
    405 S.C. 409
    , 416, 
    747 S.E.2d 784
    , 787 (2013).
    "The touchtone of Fourth Amendment analysis is whether a person has a
    'constitutionally protected reasonable expectation of privacy.'" California v.
    Ciraolo, 
    476 U.S. 207
    , 211 (1986) (quoting Katz v. United States, 
    389 U.S. 347
    , 360
    (1967) (Harlan, J., concurring)). "Katz posits a two-part inquiry: first, has the
    individual manifested a subjective expectation of privacy in the object of the
    challenged search? Second, is society willing to recognize that expectation as
    reasonable?" 
    Id. In determining
    whether the expectation of privacy is reasonable, "'[t]he test of
    legitimacy is not whether the individual chooses to conceal assertedly 'private'
    activity,' but instead 'whether the government's intrusion infringes upon the personal
    and societal values protected by the Fourth Amendment.'" 
    Ciraolo, 476 U.S. at 212
    (quoting Oliver v. United States, 
    466 U.S. 170
    , 182–83 (1984)).
    Here, the object of the challenged search is the SIM card in Moore's cell phone
    found at the crime scene.13 The majority holds "the limited search of the SIM cards
    13
    A SIM card is defined as follows:
    A Subscriber Identity Module (SIM) card is a portable memory chip
    used mostly in cell phones that operate on the Global System for Mobile
    Communications (GSM) network. These cards hold the personal
    information of the account holder, including his or her phone number,
    address book, text messages, and other data. When a user wants to
    to identify the phone numbers was reasonable and in no manner constituted an
    unreasonable search or seizure." In so holding, the majority explains that "searching
    a SIM card is fundamentally distinct from searching the full contents of an unlocked
    cell phone, making much of the language in Riley concerning the privacy
    implications for searching a cell phone inapplicable or, at best, greatly diminished
    here."
    For several reasons, I disagree with the majority's conclusion. Initially, I
    disagree with the majority's apparent dismissal of the import of Riley v. California,
    
    134 S. Ct. 2473
    (2014). As I stated in my dissent in Brown, "Riley creates a
    categorical rule that, absent exigent circumstances, law enforcement must procure a
    search warrant before searching the data contents of a cell phone." State v. Brown,
    
    423 S.C. 519
    , 531, 
    815 S.E.2d 761
    , 767 (2018) (Beatty, C.J., dissenting). I believe
    the circumstances of the instant case fall within this rule.
    Moore had a reasonable expectation of privacy in the digital contents of the
    SIM card.14 See 
    Riley, 134 S. Ct. at 2473
    (concluding society is willing to recognize
    an expectation of privacy in the digital information on a cell phone). In my view,
    there is no distinction between the digital contents of a SIM card and the full contents
    of a cell phone. At issue is the digital data, not the type of device or the amount of
    storage capacity. While the SIM card has limited storage capacity, it contains
    significant personal information about the cell phone account holder, including the
    phone number, call logs, address books, text messages, and other data. 15 Thus, even
    change phones, he or she can usually easily remove the card from one
    handset and insert it into another. SIM cards are convenient and
    popular with many users, and are a key part of developing cell phone
    technology.
    https://www.wisegeek.com/what-is-a-sim-card.htm (last visited Dec. 10, 2019
    (emphasis added).
    14
    Given the trial court ruled that Moore abandoned his cell phone, the court
    implicitly found Moore had an expectation of privacy in the cell phone, which
    included the SIM card.
    15
    The majority minimizes the privacy implication of the digital data because the
    SIM card is "simply a key to a specific mobile network" and "not part of a phone."
    If this analysis is taken to its logical extreme, one would have no expectation of
    privacy in the digital contents of a flash drive given (1) not all computers have USB
    ports; (2) flash drives may be transferred from one computer to another; and (3) a
    if law enforcement claims to confine their search to identify the phone number, the
    search nevertheless provides law enforcement access to all of the information stored
    on the SIM card. I do not believe one can dissect digital data to determine what
    information is afforded Fourth Amendment protection. Once law enforcement
    removes a SIM card in order to conduct a forensic examination, it has unrestricted
    access to personal information that is protected by the Fourth Amendment. See
    
    Riley, 134 S. Ct. at 2492
    (rejecting proposed rule that would restrict the scope of a
    cell phone search to those areas of the phone where an officer reasonably believes
    there would be information relevant to a crime such as the arrestee's identity and
    stating, "[t]his approach would sweep in a great deal of information, and officers
    would not always be able to discern in advance what information would be found
    where").
    Further, law enforcement recognized the amount of information that was
    accessible as Detective McGraw explained the SIM card "primarily contains the
    assigned cell phone number[,]. . . continuing call logs, stored contacts, things of that
    nature." During the warrantless search, Detective McGraw recovered the cell phone
    number, thirty-four contact entries, and three text messages. Therefore, despite the
    claim that the scope of the search was limited, the search provided access to and
    ultimately yielded much more than a phone number. Contrary to the majority's
    characterization, such a search cannot be deemed reasonable.
    Because Moore had a reasonable expectation of privacy in the digital contents
    of the SIM card, I would hold the warrantless search violated the Fourth
    Amendment's prohibition against unreasonable searches and seizures. See
    Carpenter v. United States, 
    138 S. Ct. 2206
    , 2213 (2018) ("When an individual seeks
    to preserve something as private, and his expectation of privacy is one that society
    is prepared to recognize as reasonable, we have held that official intrusion into that
    private sphere generally qualifies as a search and requires a warrant supported by
    probable cause." (internal quotation marks omitted)).
    II.
    Even if Moore had a reasonable expectation of privacy in the digital contents
    of the SIM card, the State argued and the trial court found Moore divested himself
    of the Fourth Amendment protection by abandoning the cell phone.
    In my view, the State failed to establish the abandonment exception to the
    Fourth Amendment warrant requirement. See State v. Dupree, 
    319 S.C. 454
    , 457,
    single computer can utilize a series of flash drives.
    
    462 S.E.2d 279
    , 281 (1995) (recognizing the doctrine of abandonment as an
    exception to the Fourth Amendment warrant requirement).
    When determining whether a defendant abandoned property for Fourth
    Amendment purposes, "the question is whether the defendant has, in discarding the
    property, relinquished his reasonable expectation of privacy so that its seizure and
    search is reasonable within the limits of the Fourth Amendment." 
    Id. at 457,
    462
    S.E.2d at 281 (quoting City of St. Paul v. Vaughn, 
    237 N.W.2d 365
    , 370–71 (Minn.
    1975)). "[A]bandonment is a question of intent and exists only if property has been
    voluntarily discarded under circumstances indicating no future expectation of
    privacy with regard to it." 68 Am. Jur. 2d Searches and Seizures § 23, at 135 (2010).
    In the context of abandonment, intent is "inferred from words, acts, and other
    objective facts." 79 C.J.S. Searches § 43, at 70 (2017).
    In this case, the objective facts known to law enforcement at the time of the
    search were as follows. The phone was found on the floorboard of the victim's
    vehicle. Although the vehicle was clearly a crime scene, law enforcement did not
    see Moore in possession of the phone, did not see him throw the phone in an effort
    to evade police, and did not know when the phone was left. Additionally, the record
    shows no denial of ownership by Moore, nor was there any evidence showing Moore
    had intentionally discarded the cell phone. In fact, Investigator Clark testified: "I'm
    sure [the flip phone] was left by mistake."
    At trial, Detective McGraw testified he received the flip phone within two
    hours of the shooting. The two-hour period was in the afternoon (approximately
    2:00 p.m. to 4:00 p.m.), 16 and there was no report that the phone was lost or stolen
    16
    Unlike the situation where an officer needs to make an instant decision to
    determine whether a suspect is reaching for identification or a weapon, no such
    exigencies existed. See 
    Riley, 134 S. Ct. at 2485
    ("Once an officer has secured a
    phone and eliminated any potential physical threats, however, data on a phone can
    endanger no one."). At trial, Investigator Lorin Williams testified: "[T]he quicker
    we can get our hands on those phones . . . the quicker it helps us with the
    investigation." However, there is no testimony in the record that the officers
    believed Moore posed an imminent threat to law enforcement. See Harris v. O'Hare,
    
    770 F.3d 224
    , 235 (2d Cir. 2014) (stating "general knowledge, without more, cannot
    support a finding of exigency"); cf. Barton v. State, 
    237 So. 3d 378
    , 381 (Fla. Dist.
    Ct. App. 2018) (holding that defense counsel was not ineffective for failing to file a
    motion to suppress evidence discovered from the warrantless search of Barton's
    abandoned cell phone where the following exigent circumstances existed: "police
    knew the gunman fired several bullets towards fifteen to twenty-five students at a
    prior to the first search. Notably, the record is unclear as to whether the screen was
    locked.17
    Next, I note, by law enforcement's own admission, the phone was left by
    mistake. The record does not reveal a single instance in which officers referred to
    the phone as "abandoned." Furthermore, law enforcement's actions and testimony
    clearly indicate an intent to identify the owner. Had the flip phone not contained
    calls to the victim, law enforcement likely would have interviewed Moore and
    returned the phone.
    In my view, considered as a whole, the objective facts known to the officer at
    the time of the initial search do not satisfy the State's burden to show Moore
    abandoned his phone. My conclusion, however, in no way limits law enforcement's
    ability to investigate an active crime scene.
    When law enforcement finds a phone, they have several less intrusive options
    at their disposal to identify the owner of the phone. These options include examining
    the exterior of the phone, using the emergency dialer to call 911 so that the dispatcher
    may identify the number associated with the phone, or contacting the phone's
    wireless service provider to determine the owner. See Mikah Sargent, How to Find
    the Owner of a Lost or Stolen iPhone, iMore (Dec. 28, 2016),
    https://www.imore.com/how-find-owner-lost-or-stolen-iphone. Ultimately, the
    protection of privacy must keep up with technological advances.
    bus stop near an elementary school; a student was seriously injured; the gunman had
    not been detained; and the gun had not been located").
    17
    From the record, it is not clear if the flip phone was password protected. The
    State claims it was not password protected; however, from my reading, it appears
    the officer did not know, and the report makes no comment on whether or not a
    password was required.
    [Defense Counsel:] This phone was password protected, wasn't it?
    [Investigator Williams:] I could not answer that.
    [Defense Counsel:] [I]n [Detective McGraw's] report, does he say it
    was password [protected]?
    [Investigator Williams:] I don't see that it was.
    III.
    Finally, I do not believe the warrantless search can be cured through the
    inevitable discovery doctrine. "[T]he inevitable discovery doctrine provides that
    illegally obtained information may nevertheless be admissible if the prosecution can
    establish by a preponderance of the evidence that the information would have
    ultimately been discovered by lawful means." State v. Cardwell, 
    425 S.C. 595
    , 601,
    
    824 S.E.2d 451
    , 454 (2019) (citing Nix v. Williams, 
    467 U.S. 431
    , 444 (1984)).
    Here, Detective McGraw testified he performed a limited forensic
    examination of all three phones found at the scene of the shooting prior to the
    issuance of a warrant. From this search, law enforcement retrieved cell phone
    numbers associated with each of the phones and, through their database, determined
    that one of the phones did not belong to the victim but, instead, belonged to Moore.
    After obtaining the search warrant, Detective McGraw determined the flip phone
    was used to make five phone calls to one of the victim's phones shortly before the
    shooting occurred.
    The State maintains this evidence would have been inevitably discovered
    because law enforcement "had the victim's phone in their possession[,]" and they
    "had every right to search the victim's phone." However, nowhere in the record does
    the State claim law enforcement pulled call logs from any of the victim's phones, or
    even if law enforcement's forensic examination equipment was capable of accessing
    the victim's iPhones' call logs.18 "The independent source doctrine allows admission
    of evidence that has been discovered by means wholly independent of any
    constitutional violation." 
    Nix, 467 U.S. at 443
    (emphasis added). Without the illegal
    search, the officers had no evidence connecting the phone to Moore. It was only
    through the unlawful action of the officers—accessing Moore's cell phone without a
    warrant—that the officers were able to connect Moore to the flip phone and the flip
    phone to the victim.
    18
    Detective McGraw recalled that he pulled the SIM card from the iPhone 4 to
    identify the number and, also, identified the number associated with the iPhone 3.
    However, he testified the extraction of call logs and text messages from the flip
    phone was not supported by the equipment and, thus, he had to take pictures of the
    call log on the flip phone. Detective McGraw also noted the victim's iPhone 4 "was
    damaged." Based on the flip phone's call log, he was ultimately able to determine
    the flip phone communicated with the iPhone 3 prior to the shooting.
    While the State claims the information was available from the victim's cell
    phone, it cannot point to any place in the record to substantiate that claim. Therefore,
    without assuming, this Court cannot conclude Moore's phone number, and the call
    log implicating Moore, would have been inevitably discovered. As a result, I would
    find the information was inadmissible. See 
    id. at 449–50
    (holding the inevitable
    discovery doctrine applied when searchers were approaching the location of a
    victim's body and would have discovered it without information obtained from the
    defendant's unlawful interrogation). 19
    IV.
    Based on the foregoing, I would find the warrantless search violated Moore's
    rights under the Fourth Amendment. In reaching this conclusion, I adhere to my
    dissent in Brown as I believe Riley gave a clear directive that law enforcement,
    absent exigent circumstances, must obtain a warrant prior to searching the digital
    contents of a cell phone. Accordingly, I would reverse the decision of the court of
    appeals and remand for a new trial.
    19
    Additionally, the State—without citing support—asks the Court to redact the
    information obtained through the illegal search and find the warrant valid. However,
    the redaction principle applies when the defendant seeks to challenge false
    statements in a search warrant affidavit. See Franks v. Delaware, 
    438 U.S. 154
    (1978) (holding a defendant has the right to challenge misstatements in a search
    warrant affidavit); State v. Robinson, 
    415 S.C. 600
    , 606–08, 
    785 S.E.2d 355
    , 358–
    59 (2016) (finding probable cause no longer existed after redacting misstatements in
    the search warrant affidavit and considering the remaining content). Most
    importantly, I believe the purpose of the exclusionary rule is defeated if a court
    applies the redaction principle to a search that violates the Fourth Amendment. If
    law enforcement obtains evidence by means of an illegal search and then belatedly
    obtains a search warrant based, in part, on the evidence, it is self-evident that
    applying the redaction principle to the search warrant on judicial review should not
    serve to cure the constitutional defect.