KWESI HUDSON v. STATE OF DELAWARE
No. 303, 2022
IN THE SUPREME COURT OF THE STATE OF DELAWARE
January 9, 2024
Court
Before SEITZ, Chief Justice; TRAYNOR and GRIFFITHS, Justices.
Upon appeal from the Superior Court. AFFIRMED.
Raymond D. Armstrong, Esquire, OFFICE OF DEFENSE SERVICES, Wilmington, Delaware, for Appellant Kwesi Hudson.
Brian L. Arban, Esquire, DELAWARE DEPARTMENT OF JUSTICE, Wilmington, Delaware, for Appellee State of Delaware.
GRIFFITHS, Justice:
Kwesi Hudson was found guilty of first-degree kidnapping, first-degree robbery, second-degree rape, and several other
First, Hudson challenges an October 15, 2021 decision of the Superior Court denying his pre-trial motion in limine to exclude the State‘s proffered expert testimony on DNA mixture interpretation and technology. The lab that processed the DNA used STRmix, a probabilistic genotyping software program. Hudson challеnged the State‘s expert report on the ground that STRmix was not scientifically reliable under
Second, Hudson appeals from a November 23, 2021 decision of the Superior Court denying his motion to suppress cell-site location information collected from cell tower dumps pursuant to ten search warrants. The information collected was not specific to Hudson; rather, it related to phone activity from all cell phones that used specific cell towers during certain limited periods. Hudson argues that these warrants violated his rights under the Fourth Amendment to the United States Constitution, Article I, Section 6 of the Delaware Constitution, and Delaware statutory law.
We find Hudson‘s challenges to be without merit. We therefore affirm his convictions and the decisions of the Superior Court.
I. RELEVANT FACTUAL AND PROCEDURAL BACKGROUND
A. The February 13 Attack
On February 13, 2017, L.M.2 drove home to her residence at Top of the Hill Apartments near Claymont, Delaware. As she walked toward her building, a man pressed his gloved hand over her face and shoved a gun into her stomach. She described the man as having a lighter complexion, gray or hazel eyes, being short in stature, and weighing around 180 pounds. She found his voice to be unique, with a twanging or . . . general accent that . . . seemed very distinguishable.3 He wielded a black gun, was dressed entirely in black, and wore a black ski mask.
The assailant grabbed her phone, forced L.M. to return to her vehicle, and told her that he was going to force her to withdraw money from an ATM. He ordered her to kneel on the passenger seat while facing the rear of the vehicle and to remove her pants and underwear. During a brief struggle, he punched L.M. in the face.
The assailаnt drove them out of the apartment complex down Silverside Road toward Marsh Road. He first drove to a nearby TD Bank branch but did not like the location because it had too much light. After forcing her to commit sexual acts, he drove to a PNC bank branch on Marsh Road and made L.M. withdraw money from the ATM. The assailant then drove them back to her apartment complex, exited her car, and told her not to move. After the assailant fled, L.M. drove to her boyfriend‘s apartment in Pennsylvania. He immediately drove her to the hospital to address her injuries.
After her attack, detectives from the New Castle County Police Department (NCCPD) had L.M. ride along with them to identify the various locations where the
B. The February 19 Attack
On February 19, 2017, S.C. drove home to her residence at Arundel Apartments near Pike Creek, Delaware. As she walked toward the building, a man grabbed her from behind, shoved her against the building, and pressed a gun to her back. She noticed that the man was wearing dark clothing, including a hoodie, ski mask, and gloves. She described him as having dark brown skin,
being about six feet tall, and weighing around 200 pounds. She also observed that he was muscular, possibly in his thirties, and had an accent that sounded somewhat foreign to [her].4
The assailant forced her to return to her apartment. Once in her apartment, he demanded money and valuables and forced S.C. to remove her pants and underwear. He raped S.C. and then made her rеturn to her vehicle to drive to a bank to force her to withdraw money from an ATM. Once inside the vehicle, he directed S.C. to kneel on the passenger seat while facing the rear of the vehicle.
The assailant first drove them to a PNC Bank branch on Limestone Road, where S.C. withdrew money from an ATM at gunpoint. They then drove to another bank, where a subsequent ATM withdrawal failed. They then drove to an Artisans Bank branch on New Linden Hill Road, where S.C. managed to escape by leaping out of the car window and running into a nearby bar. S.C. was eventually taken to a hospital where she was examined by a forensic nurse and treated for her injuries.
After the attack, NCCPD detectives collected footage from the PNC Bank branch on Limestone Road and the Artisans Bank branch on New Linden Hill Road. They also collеcted physical evidence and processed S.C.‘s apartment
building‘s exterior, her apartment, and her vehicle for fingerprints and possible DNA evidence.
C. The March 6 Attack
On March 6, 2017, J.B. took her dog for a walk in The Bluffs Apartments complex where she lived near Newark, Delaware. When she entered the building, a man pointed a gun at her head and told J.B. that he was going to rob her. She stated that the assailant was wearing a dark hoodie, black gloves, and a black mask covering his entire face. She described him as bulky, approximately 5‘8” tall, and thought he was somewhere in his thirties. She observed that he sounded [B]lack.5
The assailant forced J.B. to take him to her apartment. When they arrived, her boyfriend opened the door and she whispered that he was trying to rob her. Her boyfriend chased after the man. She ran to a nеighbor‘s house for help and the neighbor called 911. Her boyfriend described the man as having a husky build, wearing a ski mask and dark attire, and being short in stature (approximate 5‘6” to 5‘8” tall).
After J.B.‘s attack, NCCPD officers tried to track the perpetrator‘s movements using a K-9 unit. Though unsuccessful, they found a pair of vice grips in the grassy area near the apartment building. They tested the vice grips
and the building‘s exterior for fingerprints and DNA evidence. They did not find any surveillance footage of evidentiary value.
D. The Collection of Cell-Site Location Information Pursuant to Cell Tower Dumps
As part of their investigation into the three incidents, which were investigated together given their similarities, NCCPD officers obtained ten search warrants directed to five cell phone carriers for cell-site location information from cell towers in the area of the incidents.6 The first set of warrants, five warrants obtained on February 20, 2017 (the February Cell Tower Warrants), requested the following information:
[C]all detail records (CDRs) for all cellular telephone activity - whether incoming or outgoing and whether voice, data[,] or SMS related - that traversed the [cell phone carrier‘s] cell site(s) that service(s) Arundel Apartments at 3009 Crossfork Dr.[,] Wilmington, DE 19808 (39.735870, -75.672117) during the time period on 02/19/17 from 1930-2100 hours EST; Top of the Hill Apartments at 2101 Prior Rd., Wilmington DE 19809 (39.796276, -75.485160) during the time period on 02/13/17 from 1930-2130 hours EST; PNC [B]ank at 1704 Marsh Rd., Wilmington DE 19810 (39.801042, - 75.505922) during the period on 02/13/17 from 2030 to
2130 hour EST; Artisans [B]ank at 4551 New Linden Hill Rd[.], Wilmington DE 19808 (39.735290, - 75.690970) during the time period on 02/19/17 from 2000-2100 hours EST[.]7
In sum, the warrants sought call detail records from all cell phones that used the following cell towers on the following dates during the following times:
- February 13, 2017 – Activity from the cell tower servicing Top of the Hill Apartments for a two-hour pеriod (7:30-9:30 p.m.)
- February 13, 2017 – Activity from the cell tower servicing Marsh Road PNC Bank branch for a one-hour period (8:30-9:30 p.m.)
- February 19, 2017 – Activity from the cell tower servicing the Arundel Apartments for a one-and-a-half-hour period (7:30-9:00 p.m.)
- February 19, 2017 – Activity from the cell tower servicing the New Linden Hill Road Artisans Bank branch for a one-hour period (8:00-9:00 p.m.)
The second set of warrants, five warrants obtained on March 7, 2017 (the March Cell Tower Warrants and collectively with the February Cell Tower Warrants, the Cell Tower Warrants), requested the following information:
[C]all detail records (CDRs) for all cellular telephone activity - whether incoming or outgoing and whether voice, data[,] or SMS related - that traversed the [cell phone carrier‘s] cell site(s) that
service(s) The Bluffs Apartments at 1913 Sheldon Dr[.], Newark, DE 19711
(39.727713, -75.704499) during the time period on 03/06/17 from 1730-1900 hours EST[.]8
In other words, the March Cell Tower Warrants sought call detail records from all cell phones that used the cell tower servicing the area around The Bluffs Apartments on March 6, 2017 during a one-and-a-half-hour period (5:30-7:00 p.m.).
E. The Pennsylvania Incidents & Subsequent Warrants
In May 2017, Pennsylvania police informed NCCPD officers about an armed robbery that occurred at a Walgreens in Chichester Township. After the incident, Pennsylvania police found a BB gun and a black ski mask stuffed with cash in a nearby area. The black ski mask underwent DNA testing in Pennsylvania, and the DNA profile from the mask matched Hudson‘s DNA profile. Pennsylvania police also recovered a Wells Lamont left-handed glove from Hudson‘s vehicle. After obtaining the BB gun and the glove from the Pennsylvania police, NCCPD officers swabbed both the glove and BB gun for DNA evidence. Pennsylvania police also provided NCCPD investigators with Hudson‘s cellphone number, though they had already separately obtained the number.
After NCCPD investigators cross-referenced Hudson‘s cell phone number with the numbers obtained from the Cell Tower Warrants, they obtained a search warrant for Hudson‘s cell-site locations specific to his phone number.9 NCCPD officers, with assistance from the Federal Bureau of Investigation, learned that on February 13, 2017, Hudson‘s phone twice used the cell tower pointing toward the crime scene between approximately 6:30 and 8:00 p.m. On February 19 and March 6, 2017, Hudson‘s phone used cell towers near areas around the crimes and his Wilmington residence, but not any cell towers directed toward the crime scenes.
F. DNA Labs International‘s Report Utilizing STRmix
NCCPD investigators sent several evidence and reference swabs to the Delaware Division of Forensic Sciеnce for traditional DNA analysis. The Division found that Hudson did not contribute to the DNA found on the exterior door of J.B.‘s apartment building, but that he was a major contributor to the DNA found on the Wells Lamont left-handed glove that Pennsylvania police found. It also found that swabs of certain evidentiary items, such as the BB gun, produced mixed DNA profiles from which the Division could not draw any official conclusions about the identities of the individual contributors. Upon the Division‘s recommendation,
NCCPD investigators sent DNA swabs from the victims and the BB gun to DNA Labs International (DNA Labs) for probabilistic genotyping analysis using STRmix software.
Alicia Cadenas, a senior DNA analyst with DNA Labs at the time, used STRmix to analyze a mixture of DNA samples from the three victims and the BB gun taken from Hudson.10 The resulting profile (the
The DNA profile obtained from the extract is approximately 320 trillion times more probable if the sample originated from [S.C.] (Contributor #1) and two unknown persons than if it originated from three unknown persons. Therefore, there is extremely strong support that [S.C.] and two unknown persons contributed to this DNA profile, rather than three unknown persons.12
In other words, Cadenas opined that it was extremely likely that the DNA extracted from the BB gun originated in part from S.C.
G. The Indictment and Pre-Trial Motions
On September 24, 2018, a Superior Court grand jury indicted Hudson on two counts each of first-degree kidnapping, first-degree robbery, and terroristic
threatening, as well as one count each of aggravated menacing, first-degree assault, third-degree assault, first-degree burglary, home invasion, attempted second-degree kidnapping, second-degree rape, attempted first-degree robbery, and first-degree unlawful sexual contact.
Before trial, Hudson filed a motion in limine to exclude the State‘s proffered expert testimony on DNA testing results—the DNA Labs Report—and sought a Daubert hearing to test its admissibility.13 The Superior Court denied Hudson‘s motion, finding that the DNA Labs Report was sufficiently reliable and that a Daubert hearing was unnecessary on the record before it.14
Hudson also filed a motion to suppress evidence collected pursuant to the Cell Tower Warrants.15 The Superior Court also denied this motion, finding that the Cell Tower Warrants were constitutional and were supported by probable cause.16
H. Trial, Sentencing, and Appeal
Hudson‘s case proceeded to trial on December 6, 2021. On December 15, 2021, the jury convicted him of all charges following a seven-day trial. On July 29, 2022, the Superior Court sentenced Hudson to а total of 162 years of Level
V imprisonment, suspended after 150 years for probation. Hudson filed his notice of appeal on August 25, 2022.
II. STANDARD OF REVIEW
We review a trial court‘s decision to admit or exclude evidence for abuse of discretion.17 We review alleged constitutional
III. ANALYSIS
For the reasons set forth below, we conclude that Hudson‘s challenges to the Superior Court‘s motion in limine and motion to suppress decisions are without merit. Accordingly, we affirm Hudson‘s convictions and sentence.
A. Hudson‘s Motion in Limine Challenge
The Superior Court did not err when it: (1) found the State‘s proffered expert testimony on DNA mixture interpretation and technology—the DNA Labs Report that utilized STRmix software—to be sufficiently reliable; and (2) denied Hudson‘s
request for a Daubert hearing.
A witness who is qualified as an expert by knowledge, skill, experience, training, or education may testify in the form of an opinion or otherwise if: (a) the expert‘s scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or to determine a fact in issue; (b) the testimony is based on sufficient facts or data; (c) the testimony is the product of reliable principles and methods; and (d) the expert has reliably applied the principles and methods to the facts of the case.21
On appeal, Hudson appears to challenge the State‘s expert testimony on the grounds that it is not the product of reliable principles and methods and that it is not based on sufficient facts or data, calling the DNA Labs Report unfounded and unsupported pseudoscience.25 Specifically, Hudson argues that the report has an interpretation [that] includes unknown mathematical computation that varies
widely from laboratory to laboratory and that Cadenas premise[d] [the DNA Labs Report‘s] results on if and likelihood ratios containing no concrete and scientifically accepted practices.26 Hudson also argues that a Daubert hearing was necessary to test the admissibility of the State‘s proffered expert opinion. We disagree and address both in turn.
1. DNA-Sorting Evidence, Probabilistic Genotyping, and STRmix
Numerous state and federal courts have grappled with the reliability of DNA-sorting
2. STRmix Is Reliable under D.R.E. 702 and Daubert
On this record, the State‘s proffered expert testimony is reliable under
We first look to whether STRmix is testable. This is so, because, [o]rdinarily, scientific testing is a key consideration for a trial judge in determining reliability because testing a hypothesis separates science from other fields of human inquiry.35 Indeed, if there is no way to show whether a technology is testable, there is no way to demonstrate whether it works or to accord it scientific status.36
STRmix is testable. In fact, before labs can use STRmix, they must perform an internal validation of the software.37 DNA Labs has fulfilled the [Scientific
Working Group on DNA Analysis Methods‘s] guidelines for validation of probabilistic genotyping systems as well as satisfied the validation requirements set forth by the laboratоry‘s accrediting body and completed its internal validation in 2017.38 Results from the lab‘s internal validation were consistent with those included in a Federal Bureau of Investigation publication—Internal Validation of STRmix for
We next look to whether STRmix has been subjected to peer review and publication.43 Publication in a peer-reviewed journal typically satisfies this consideration,44 as readership and citation are pivotal when it comes to legal scholarship and why publication itself is noteworthy in scientific scholarship—and ultimately why publication in a peer-reviewed journal alone typically satisfies this Daubert inquiry.45 STRmix ably clears this hurdle as it has been subjected to extensive peer review and publication.46
We also look to STRmix‘s error rate and the standards to lower it. This consideration looks to the error rate of the technology and to whether the scientific community has established standards that forensic scientists can use to mitigate the risk of error.47 STRmix boasts a very
existence of standards to guide the use of STRmix and оther probabilistic genotyping software.49
Indeed, recent studies have shown that STRmix has become increasingly reliable, even with DNA samples with more than three contributors.50
We finally look to whether there is general acceptance in the scientific community for STRmix. This inquiry focuses on whether the relevant scientific community accepts the software.51 This, too, can be answered in the affirmative.52 STRmix is in widespread use in labs at the local, state, federal, and international levels.53
In answering yes to
3. No Daubert Hearing Was Necessary
Hudson separately argues that the Superior Court abused its discretion by failing to hold a Daubert hearing. He argues that, had a hearing been held, he would have shown myriad reasons why the State‘s proffered expert testimony would have been deemed inadmissible. In support, he points to numerous portions of Cadenas‘s trial transcript, which, in his view, show why the expert testimony is problematic and does not pass muster under
As an initial matter, these hearings are discretionary.55 Trial courts have considerable leeway in assessing the relevance and reliability of expert testimony and in performing their gatekeeping function.56 Inherent in such latitude is the
to fulfill its gatekeeping duties, the form of the proceeding is within their discretion.58
Based on this record, the Superior Court acted within its sound discretion in ruling on the admissibility of the State‘s proffered expert tеstimony without first holding a Daubert hearing. The trial judge had a sufficient record upon which to rely; namely, the expert report itself, a robust affidavit from DNA Labs employees Rachel Oeflein and Cristina Rentas detailing STRmix‘s scientific reliability,59 and the parties’ submissions.60
Accordingly, the State‘s expert opinion testimony was properly admitted as scientifically reliable, and the Superior Court did not err in denying Hudson‘s motion in limine and declining to hold a Daubert hearing.
B. Hudson‘s Motion to Suppress Challenge
The Superior Court did not err when it found that the Cell Tower Warrants passed constitutional muster and that the affidavits supporting issuance of the warrants established requisite probable cause. On appeal, Hudson argues that the Cell Tower Warrants are unconstitutional under the United States Constitution and Article 1, Section 6 of the Delaware Constitution, as well as Delaware statutory law. He аlso claims that the affidavits did not establish probable cause sufficient for the warrants to issue, nor were they sufficiently particular. To support his arguments, Hudson largely relies on a recent United States Supreme Court decision, Carpenter v. United States.61 We find that Carpenter does not apply to the tower dump warrants issued here. We also find Hudson‘s other arguments to be without merit.
1. Cell Sites, Cell-Site Location Information, and Tower Dumps
Before we address Hudson‘s substantive claims, a brief primer on cell-site location information (“CSLI“) and tower dumps is merited. Carpenter provides a useful overview of the relationship between cell sites, CSLI, and tower dumps:
Cell phones perform their wide and growing variety of functions by connecting to a set of radio antennas called “cell sites.” Although cell sites are usually mounted on a tower, they can also be found on light posts, flagpoles, church steeples, or the sides of buildings. Cell sites typically have several directional antennas that divide the covered area into sectors.
Cell phones continuously scan their environment looking for the best signal, which generally comes from the closest cell site. Most modern devices, such as smartphones, tap into the wireless network several times a minute whenever their signal is on, even if the owner is not using one of the phone‘s features. Each time the phone connects to a cell site, it generates a time-stamped record known as cell-site location information (CSLI). The precision of this information depends on the size of the geographic area covered by the cell site. The greater the concentration of cell sites, the smaller the coverage area. As data usage from cell phones has increased, wireless carriers have installed more cell sites to handle the traffic.62
Tower dumps are “download[s] of information on all the devices that connected to a particular cell site during a particular interval.”63
2. Hudson‘s Fourth Amendment Claim
Hudson challenges the Cell Tower Warrants under the Fourth Amendment to the United States Constitution, Article I, Section 6 to the Delaware Constitution, and Delaware statutory law. The Fourth Amendment provides:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue,but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.64
Though Hudson mentions in cursory fashion that Article 1, Section 6 to the Delaware Constitution provides greater protection than the United States Constitution when it comes to determining whether a seizure has occurred, we find that he has not fairly presented a separate argument under the Delaware Constitution. As we recently reaffirmed in Thomas v. State:
[T]he proper presentation of an alleged violation of the Delaware Constitution should include a discussion and analysis of one or more of the following criteria: textual language, legislative history, pre-existing state law, structural differences, matters of particular state interest or local concern, state traditions, and public attitudes or other applicable criteria.65
Indeed, we do not “address state constitutional claims when a party ‘does not specifically
The warrant requirement has dual objectives: (1) to ensure that “searches deemed necessary [are] as limited as possible” and; (2) to eliminate “exploratory rummaging in a person‘s belongings.”67 Accordingly, a warrant must “describe the things to be searched with sufficient particularity and be no broader than the probable cause on which it is based.”68 Here, we consider for the first time a challenge to search warrants for CSLI from tower dumps on these grounds.
3. Carpenter is Not Appliсable to Warrants for CSLI Derived from Cell Tower Dumps
Hudson argues that the United States Supreme Court‘s decision in Carpenter should frame our analysis on the constitutionality of the warrants at issue here. We find it does not, though it does contain important general principles related to the admissibility of data generated by and stored in smartphones. In Carpenter, the Supreme Court was tasked with determining a narrow issue: the application of the Fourth Amendment to the federal government‘s collection of Timothy Carpenter‘s historic CSLI. Specifically at issue was whether the federal government‘s collection of Carpenter‘s historic CSLI from two wireless carriers under the StoredCommunications Act constituted a search under the Fourth Amendment.69
Importantly, the Supreme Court held as a threshold matter that “an individual maintains a legitimate еxpectation of privacy in the record of his physical movements as captured through CSLI.”70 It ultimately held that the CSLI obtained from Carpenter‘s wireless carriers was a search under the Fourth Amendment and that “the [g]overnment must generally obtain a warrant supported by probable cause before acquiring such records.”71
But Carpenter is inapposite here. The Supreme Court itself acknowledged the specificity of its decision:
Our decision today is a narrow one. We do not express a view on matters not before us: real-time CSLI or “tower dumps” (a download of information on all the devices that connected to a particular cell site during a particular interval). We do not disturb the application of Smith and Miller or call into question conventional surveillance techniques and tools, such as security cameras. Nor do we аddress other business records that might incidentally reveal location information. Further, our opinion does not consider other collection techniques involving foreign affairs or national security.72
And as a substantive matter, the information sought in Carpenter (by court order and pursuant to federal statute, geared specifically toward Carpenter, aimed at a four month period, and with no parameters on geographic location area) is very different from the information sought here (by search warrant, geared at all cell phone activity that utilized certain cell towers, aimed at an extremely limited and specific window of time, and for a limited geographic area).
4. The Cell Tower Warrants Are Constitutional under the Fourth Amendment
The Superior Court did not err in finding that the Cell Tower Warrants are constitutional because they are both particularized and are no broader than the probable cause on which they are based. We agree with the Superior Court‘s conclusion but, at the same time, note that it elides a more fundamental question: whether a search warrant is required to secure tower dump data in the form of CSLI covering limited periods of time in the specific vicinity of crime scenes. The State argued that the Fourth Amendment does not require a warrant under these circumstances, and Hudson offered no argument against that position. And there is ample authority, both before and after Carpenter, supporting the view that the Fourth Amendment is not violated when officers secure CSLI for particular places at specific, limited times under the
Hudson first claims that the Cell Tower Warrants lack particularity and are thus unconstitutional general warrants. This is so, he argues, because they “sought information from all cell phone providers . . . for all cell towers located in the area of numerous locations.”75 He contends that
The United States Constitution specifies two matters that must be described with particularity in a search warrant: (1) the place to be searched; and (2) the “persons or things” to be seized.77 As we observed in Wheeler, “[s]atisfying theparticularity requirement is difficult in the еlectronic search warrant context, given the commingling of relevant and irrelevant information and the complexities of segregating responsive files ex ante.”78 And a non-particularized, general warrant is invalid because “it vests the executing officers with unbridled discretion to conduct an exploratory rummaging through [the defendant‘s] papers in search of criminal evidence.”79
The Cell Tower Warrants describe what investigating officers believed would be found in CSLI from a tower dump with as much specificity as possible under the circumstances.80 First, the Cell Tower Warrants on their face make clear that their scope is limited to tower dumps from five cell sites in the areas around the incidents.81 Second, the CSLI sought from these tower dumps in the Cell TowerWarrants is for time periods no greater than two hours—the opposite of the “boundless” warrants with which we took issue with in Wheeler.82 In addition, the type of record sought—“call detail records for all cellular telephone activity . . . whether incoming or outgoing and whether voice, data[,] or SMS related” that traversed the aforementioned cell sites—is also specifically described and not targeted toward the content of any communications.83 Here, the
The State established probable cause to believe that the offenses described in the Cell Tower Warrants had been committed. For a search warrant to issue under the Fourth Amendment, there must also “be more than just probable cause that a crime has been committed; there must also be, within the four corners of the affidavit, . . . facts adequate for a judicial officer to form a reasonable belief that . . . the property to be seized will be found in a particular place.”84 We applya totality of the circumstances test in determining whether probable cause to obtain a search warrant exists.85
The State clearly met the bar here with the Cell Tower Warrants. Both the February Cell Tower Warrants and the March Cell Tower Warrants identify a set of operative facts establishing probable cause that the offenses described in the warrants were committed (and that information related to the perpetrator could be found by tower dumps), namely by providing in their respective affidavits detailed explanations of the incidents, including the area in which the incidents took place (including the locations of the apartment complexes and the surrounding banks), the timing and length of such incidents, as well as other pertinent details.
Accordingly, the Cell Tower Warrants were valid under the Fourth Amendment, and the Superior Court did not err in so concluding.
IV. CONCLUSION
The judgment of the Superior Court is affirmed.
