816 S.E.2d 748
Ga. Ct. App.2018Background
- Stephens was arrested after an armed robbery in which he (identified in surveillance and by victim) pointed a gun, accompanied by accomplices, and fled in the victim's truck; surveillance showed a distinctive blue jacket. Police recovered a pistol on Stephens at arrest and seized his cell phone. Video from the phone showed Stephens with the pistol.
- At trial the State used the phone video to impeach Stephens' statement that he found the gun the day he was arrested; the State did not claim the recovered gun was the robbery gun.
- During jury selection the State asked to undo prior peremptory strikes; the court "rewound" the strike process and both sides regained earlier strikes. Stephens objected and moved for new trial after conviction.
- Stephens moved to suppress the contents downloaded from his unlocked phone before police obtained a search warrant; police had the phone unlocked after Stephens requested it during custodial interrogation and asked a tech-investigator to "dump" the phone to preserve data.
- Trial court denied suppression (finding the download permissible as a preservation/exigent measure); later a warrant was obtained and a warrant authorizing search of the phone was executed. Stephens was convicted on two counts of armed robbery (taking phone and taking truck), among other counts.
Issues
| Issue | Plaintiff's Argument (Stephens) | Defendant's Argument (State) | Held |
|---|---|---|---|
| Jury-selection reset of peremptory strikes | Reset allowed State to revisit jurors and prejudiced defense; OCGA § 15-12-166 requires sworn juror once accepted | Court has authority to manage selection process; defense regained strikes and was not forced to accept any juror | No reversible error; no demonstrated prejudice, appeal denied on this claim |
| Warrantless download of cell-phone data | Download of phone contents before warrant violated Fourth Amendment; fruits should be suppressed | Download was a protective/exigent step to preserve evidence and a warrant was later obtained | Even if initial download was unlawful, independent-source doctrine allows admission because later search was pursuant to a valid warrant not based on the download |
| Reliance on exigent-circumstances exception to Riley | No exigency justified warrantless access to digital content | Police reasonably sought to prevent remote wipe/lock and preserve evidence while securing a warrant | Court did not decide whether exigency applied; resolved suppression issue on independent-source grounds instead |
| Merger of two armed-robbery counts | Two robberies arose from one continuous transaction; counts should merge to avoid multiple punishments | Counts charged distinct items (phone and truck) as stolen | Court held the two armed-robbery counts arose from a single transaction and must merge; sentence vacated and case remanded for resentencing |
Key Cases Cited
- Riley v. California, 134 S. Ct. 2473 (recognizing heightened privacy interests in cell-phone data and limiting searches incident to arrest)
- Jackson v. Virginia, 443 U.S. 307 (standard for reviewing sufficiency of the evidence)
- Teal v. State, 282 Ga. 319 (independent-source doctrine discussion in Georgia)
- United States v. Barron-Soto, 820 F.3d 409 (11th Cir. application of independent-source doctrine to warrantless cell-phone searches)
- Jernigan v. State, 333 Ga. App. 339 (merger doctrine: single transaction rule for multiple thefts)
