History
  • No items yet
midpage
People v. d'Estree
2024 COA 106
Colo. Ct. App.
2024
Check Treatment
Opinion Summary

Facts

  1. The partition action involves two properties in Charlestown, Rhode Island, owned by Peter Karasuk, Lee Karasuk Ingley, and Sandra Karasuk Puchalski as joint tenants. [lines="53-55"].
  2. The siblings inherited the properties from their mother’s estate in 2017 and later attempted to sell them, which resulted in a partition action filed by plaintiffs on May 3, 2021. [lines="56-60"].
  3. After numerous continuances for various reasons, including the defendant's hearing impairment, a request for property tax payments from plaintiffs was granted, requiring each sibling to pay an equal share. [lines="90-96"].
  4. Defendant failed to appear at important hearings, and her appeals were subsequently dismissed by the trial court. [lines="98-104"].
  5. The Superior Court granted the motion for the sale of the properties and appointed a commissioner to oversee the sale on January 4, 2023. [lines="135-140"].

Issues

  1. Whether the trial court properly quashed the statement filed by the defendant in the Town of Charlestown Land Evidence Records. [lines="231-232"].
  2. Whether the trial court erred by granting the commissioner’s petition for instructions to engage a title examiner and appraiser. [lines="281-282"].
  3. Whether dismissals of defendant's appeals were properly executed given her claims of inadequate notice. [lines="358-359"].

Holdings

  1. The court affirmed the order quashing the defendant’s statement, as it did not dispute the title to the properties and was treated as a lis pendens. [lines="276-277"].
  2. The court found no error in granting the commissioner’s petition for instructions, as the defendant waived any lack of notice by being present when the matter was discussed. [lines="286-288"].
  3. The court upheld the dismissals of the defendant's appeals based on her failure to appear at crucial hearings and her acknowledgment of notice. [lines="376-378"].

OPINION

<div><div><div><div id="pdf-container" style="width: 782px">
<div id="pf1" data-page-no="1">
<div>
<div>
<div> </div>
<div> </div>
<div>SUMMARY </div>
<div>October 3, 2024 </div>
<div> </div>
<div>
2024COA106
<span> </span>
</div>
<div> </div>
<div>No. 22CA0237, <span>People v. d<span>’</span><span>Estree</span></span><span> </span><span>—</span> Constitutional Law <span>—</span> </div>
<div>Fourth Amendment <span>—</span> Searches and Seizures <span>—</span> Exclusionary </div>
<div>Rule <span>—</span> Independent Source Exception <span>—</span> Inevitable Discovery </div>
<div>Exception<span> </span>
</div>
<div>A division of the court of appeals reverses the district court<span>’</span><span>s </span>
</div>
<div>decision declining to suppress evidence obtained from t<span></span>he second of </div>
<div>two warrants issued to search the contents of a defendant<span>’</span>s cell </div>
<div>phone.  While the second warrant would have met the inde<span></span>pendent </div>
<div>source doctrine’s requirements, <span>here police used an illegally </span>
</div>
<div>obtained cell phone PIN code to execute the otherwise lawful second </div>
<div>warrant.  Thus, the district court should have excluded evidence </div>
<div>obtained from the phone at trial.  The division further holds that </div>
<div>when police seek to obtain a cell phone PIN code without a </div>
<div>defendant<span>’s consent, in this case via a digital “brute force at<span></span>tack,” </span>
</div>
<div>this constitutes a search under the Fourth Amendment and </div>
</div>
<div>
<div>The summaries of the Colorado Court of Appeals published opinions </div>
<div>constitute no part of the opinion of the division but have been prepared by </div>
<div>the division for the convenience of the reader.  The summaries may not be </div>
<div>cited or relied upon as they are not the <span>official language of the division. </span> </div>
<div>Any discrepancy between the language in the summary and in the opinion </div>
<div>should be resolved in favor of the language in the opinion. </div>
</div>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2" data-page-no="2">
<div><div>
<div> </div>
<div>requires authorization via a warrant.  Finally, the division holds </div>
<div>that the use of the PIN code here does not meet the requi<span></span>rements of </div>
<div>the inevitable discovery doctrine as police abandoned the lawful </div>
<div>search to find the PIN code pursuant to the second warrant and </div>
<div>expedited their access to the phone using the PIN code illegally </div>
<div>obtained pursuant to the first warrant<span>.  </span>The defendant<span>’</span>s convictions </div>
<div>are reversed, and the case is remanded to the district court to hold </div>
<div>a new trial<span>.  </span> </div>
<div> <span> </span>The special concurrence highlights t<span>wo</span> aspects of the </div>
<div>inevitable discovery jurisprudence that may warrant </div>
<div>reconsideration.    </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf3" data-page-no="3">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMq/p6V/MMqp6VuLCMHl7TCMfDWkGnolJvg0MLudk5YNy1msQMWA4%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=QPcEch2GMT7AujAlMyrmicXJhLo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div> </div>
<div>COLORADO COURT OF APPEALS                                                <span>
2024COA106
</span> </div>
<div> </div>
<div> </div>
<div>Court of Appeals No. 22CA0237 </div>
<div>Jefferson County District Court No. 19CR4149<span> </span>
</div>
<div>Honorable Jeffrey R. Pilkington, Judge </div>
<div> </div>
<div> </div>
<div>The People of the State of Colorado, </div>
<div> </div>
<div>Plaintiff-Appellee, </div>
<div> </div>
<div>v. </div>
<div> </div>
<div>Alec d’Estree,<span> </span>
</div>
<div> </div>
<div>Defendant-Appellant. </div>
<div> </div>
<div> </div>
<div>JUDGMENT REVERSED AND CASE<span> </span>
</div>
<div>REMANDED WITH DIRECTIONS<span> </span>
</div>
<div> </div>
<div>Division II </div>
<div>Opinion by JUDGE FOX </div>
<div>Sullivan, J., concurs </div>
<div>Grove, J., specially concurs </div>
<div> </div>
<div>Announced October 3, 2024 </div>
<div> </div>
<div> </div>
<div>Philip J. Weiser, Attorney General, Paul Koehler, Senior Counsel, Denver, </div>
<div>Colorado, for Plaintiff-Appellee </div>
<div> </div>
<div>Gregory Lansky, Alternate Defense Counsel, Aurora, Colorado, for Defendant-</div>
<div>Appellant</div>
</div>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf4" data-page-no="4">
<div><div>
<div>1 </div>
<div>¶ 1<span> </span><span>Defendant, Alec d<span>’</span>Estree, appeals his convictions, challenging </span>
</div>
<div>the district court<span>’</span>s order declining to suppress evidence gathered </div>
<div>from his cell phone using a PIN code obtained via an infirm </div>
<div>warrant<span>.  <span>We reverse his convictions and remand the case for a new </span></span>
</div>
<div>trial.   </div>
<div>I.<span> <span>Background </span></span>
</div>
<div>¶ 2<span> </span><span>On<span> October 15, 2019, Lakewood police officers responded to a </span></span>
</div>
<div>shooting outside an apartment complex around midnight<span>.  </span>They </div>
<div>found the victim <span>—</span> who had been shot in the chest <span>—</span> in the </div>
<div>parking lot.  First responders transported him to the hospital, </div>
<div>where he later died<span>.  </span>A neighbor testified that, shortly before police </div>
<div>arrived, she heard arguing<span>, </span>a car horn<span>, </span>and then a gunshot, and </div>
<div>saw<span> three individuals rush to a waiting car before driving away.<span></span>  At </span>
</div>
<div>trial, Autumn Lucero <span>—</span> who had been present when the shooting </div>
<div>occurred and accepted a plea deal from the prosecution before she </div>
<div>testified <span>—</span> detailed her version of the events leading up to the </div>
<div>killing<span>. <span> <span>  <span> </span></span></span></span>
</div>
<div>¶ 3<span> </span><span>Lucero testified that, on October 14, 2019, she was traveling </span>
</div>
<div>with her ex-boyfriend Manuel Garcia and her cousin Dominic </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf5" data-page-no="5">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>2 </div>
<div>Maestas.</div>
</div>
<div><div>1</div></div>
<div>
<div>  Garcia and Maestas <span>st</span>ole several items from a </div>
<div>convenience store and later robb<span>ed</span> some teenagers <span>in</span> <span>a </span>grocery </div>
<div>store parking lot.  D<span>’</span>Estree was at Lucero<span>’</span><span>s </span><span>apartment</span><span>, </span>to which <span></span>the </div>
<div>group had returned after the robbery<span>.  </span><span>D’Estree joined t</span><span>he</span> group<span>, </span>
</div>
<div>which then went to a friend<span>’</span>s house where Garcia re<span>tr</span>ieved a silver </div>
<div>handgun.   </div>
<div>¶ 4<span> </span><span>The group next traveled to a private residence in Littleton </span>
</div>
<div>where, two weeks before, they had sold a stolen iPhone to an </div>
<div>individual.  According to Lucero, Garcia<span>’</span>s sister <span>“</span>had gotten beat up </div>
<div>for the stolen iPhone,<span>”</span> so the group returned to the residence <span>“</span>to </div>
<div>retaliate.<span>”</span><span>  Garcia fired the silver handgun at the house <span>“</span>[s]ix or </span>
</div>
<div>seven times<span>”</span> in a drive-<span>by</span> shooting, <span>but</span> no one was harm<span></span>ed.</div>
</div>
<div><div>2</div></div>
<div>
<div>  <span> </span>
</div>
<div>¶ 5<span> </span><span>Lucero testified that the group still wanted to <span>“</span>make some </span>
</div>
<div>money<span>”</span><span> by </span><span>“</span><span>robbing, stealing cars, et cetera.<span>”</span>  While at <span>an<span></span><span> </span></span></span>
</div>
<div>apartment complex<span>, </span>Lucero saw d<span>’</span>Estree leave the car with the </div>
<div> </div>
</div>
<div><div>1</div></div>
<div>
<div> Lucero, Garcia, and Maestas were originally set to be t<span></span>ried </div>
<div>together as codefendants with d<span>’</span>Estree, but the district court later </div>
<div>severed d<span>’</span><span>Estree<span>’</span></span>s trial.<span>  </span><span> </span>
</div>
</div>
<div><div>2</div></div>
<div>
<div> A prosecution expert later testified that her analysis of<span></span> shell </div>
<div>casings and the bullets led her to conclude that the same gun <span></span>was </div>
<div>used in the drive-by shooting and the homicide<span>.  <span>A </span></span>matching shell </div>
<div>was also found in Lucero<span>’</span>s apartment.  <span> </span>
</div>
</div>
<a href="#pf5" data-dest-detail='[5,"XYZ",69,187,null]'><div style="border-style:none;position:absolute;left:166.762778px;bottom:877.999444px;width:10.080000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a><a href="#pf5" data-dest-detail='[5,"XYZ",69,137,null]'><div style="border-style:none;position:absolute;left:618.610556px;bottom:416.031667px;width:10.080000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf6" data-page-no="6">
<div><div>
<div>3 </div>
<div>silver handgun before hearing yelling, a car horn, and a gunsh<span></span>ot.  </div>
<div>D<span>’</span><span>Estree returned to the car and the group left the victim <span></span>in the </span>
</div>
<div>parking lot.<span>  </span>After arriving home, Lucero photographed Garcia, </div>
<div>Maestas, and d<span>’</span>Estree posing with the gun.  According t<span></span>o Lucero, </div>
<div>the next day d<span>’</span>Estree used his phone to search the internet for </div>
<div>“<span>anything about what happened the night before.</span>”<span>  <span> </span></span>
</div>
<div>¶ 6<span> </span><span>The defense pointed out on cross-examination that Lucero<span>’</span><span>s </span></span>
</div>
<div>trial testimony substantially differed from her earlier statements to </div>
<div>police.  For example, in her first interview with police in Novembe<span></span>r </div>
<div>2019, Lucero only told them about the drive-by shooting and not </div>
<div>the homicide<span>.  </span>During that interview Lucero claimed that only she, </div>
<div>Garcia, and Maestas were in the car for the drive-<span>by</span> shooting; <span></span>at </div>
<div>trial, she said that she had initially <span>“</span><span>forgotten<span>”</span></span> that d<span>’</span>Estree was </div>
<div>there.  Lucero further first told police that Garcia forced her, at </div>
<div>gunpoint, to drive the car to the drive-by shooting location and that </div>
<div>d<span>’</span><span>Estree later forced her, at gunpoint, to remain in the bac<span></span>kseat of </span>
</div>
<div>the car during the robbery that resulted in the victim<span>’</span>s death<span>.  </span><span> </span>
</div>
<div>¶ 7<span> </span><span>Sergeant Jonathan Holloway testified that the homicide </span>
</div>
<div>investigation initially produced no suspects, nor did anything </div>
<div>connect the drive-by shooting to the homicide, until the police </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf7" data-page-no="7">
<div><div>
<div>4 </div>
<div>learned that Garcia wanted to speak to them<span>.  </span>Once aware of </div>
<div>d<span>’</span><span>Estree<span>’</span><span>s potential involvement police arrested him, and lat<span></span>er </span></span>
</div>
<div>charged him on November 14, 2019.  Police also seized his Apple </div>
<div>iPhone, and searched and downloaded all of its cont<span></span>ents after </div>
<div>acquiring a search warrant on November 20, 2019<span>.  </span>  </div>
<div>¶ 8<span> </span><span>The district court, however, concluded the first search warrant </span>
</div>
<div>for the cell phone<span>’</span>s contents was invalid because it was overbroad<span>.  </span>
</div>
<div>The prosecution later sought a second warrant to repeat the sea<span></span>rch<span>, </span>
</div>
<div>as <span>discussed in greater detail below. </span>
</div>
<div>¶ 9<span> </span><span>Pursuant to the second warrant, the court allowed police to </span>
</div>
<div>search the contents of d<span>’</span><span>Estree<span>’</span></span>s cell phone from October 1, <span></span>2019, </div>
<div>to November 12, 2019, and the prosecution presented evidence </div>
<div>collected from the phone <span>at d’Estree’s </span>homicide trial.  The </div>
<div>prosecution admitted four pictures recovered from d<span>’<span>Estree</span><span>’</span></span>s phone </div>
<div>taken inside Lucero<span>’</span>s home approximately one hour after the </div>
<div>homicide<span>. <span> <span>One image showed Maestas and d<span>’</span>Estree standing, while </span></span></span>
</div>
<div>d<span>’</span><span>Estree pointed a silver handgun at the camera.  One image </span>
</div>
<div>showed Garcia smiling for the camera, and another showed </div>
<div>Maestas with two handguns, one black and the other silver, t<span></span>ucked </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf8" data-page-no="8">
<div><div>
<div>5 </div>
<div>into the strap of what appeared to be a bulletproof vest<span></span>.  The last </div>
<div>image showed Garcia pointing both handguns at the camera. <span></span> <span> </span>
</div>
<div>¶ 10<span> </span><span>The phone also contained several text messages d<span>’</span>Estree sent </span>
</div>
<div>in the weeks following the homicide<span>. </span> Most notably, d<span>’</span>Estree sent </div>
<div>the following message on November 3, 2019: </div>
<div>Ayee fam <span>. . .</span> just gotta check in with all my </div>
<div>n[*****]s before I get locked up just wanted to </div>
<div>let you know I appreciate you fam . . . [.] </div>
<div>¶ 11<span> </span><span>The recipient of the message asked when d<span>’</span>Estree would go to </span>
</div>
<div>prison, and d<span>’</span>Estree responded: <span>“</span>Shit they ain<span>’</span>t kaught me y<span></span>et but </div>
<div>they looking for somebody they just won<span>’</span>t release the name and shit </div>
<div>link soon fam.<span>”</span><span>  </span><span> </span>
</div>
<div>¶ 12<span> </span><span>Police also recovered d<span>’</span><span>Estree<span>’</span></span>s internet search history<span>.  </span></span>
</div>
<div>Holloway testified that police found <span>“</span>[s]earch histories for looking </div>
<div>for man shot, articles of man shot in West Denver and Lak<span></span>ewood<span>”</span> </div>
<div>from October 15 and 16, 2019.  <span> </span>
</div>
<div>¶ 13<span> </span><span>The jury found d<span>’</span>Estree guilty on all charges <span>—</span> first degree </span>
</div>
<div>felony murder, second degree murder, conspiracy to <span></span>commit </div>
<div>aggravated robbery, three charges of criminal attempt to commit </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf9" data-page-no="9">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>6 </div>
<div>aggravated robbery,</div>
</div>
<div><div>3</div></div>
<div>
<div> and two crime of violence sentence enhancers<span>.  </span>
</div>
<div>The district court only sentenced d<span>’</span>Estree for his felony murde<span></span>r and </div>
<div>conspiracy to commit aggravated robbery convictions because hi<span></span>s </div>
<div>second degree murder and attempt to commit aggravated robbe<span></span>ry </div>
<div>convictions merged into his felony murder conviction.  The district </div>
<div>court sentenced him to life without the possibility of parole for his </div>
<div>felony murder conviction and sixteen years in the custody of the </div>
<div>Department of Corrections for the conspiracy to commit<span></span> aggravated </div>
<div>robbery conviction, served concurrently<span>.  </span><span> </span>
</div>
<div>¶ 14<span> </span><span>This appeal followed<span>.  D<span>’</span></span>Estree rais<span>es</span> four main issues<span>, </span></span>
</div>
<div>arguing that (1) the district court erred by declining to suppress </div>
<div>evidence gathered from his phone after the second warrant was </div>
<div>issued; (2) Lucero was coerced into waiving her Fifth Amendm<span></span>ent </div>
<div>rights and testifying at trial, with the district court improperly </div>
<div>advising the jury not to consider Lucero<span>’</span>s punishment; (3) the </div>
<div>district court erred by failing to properly instruct the jury on </div>
<div> </div>
</div>
<div><div>3</div></div>
<div>
<div> The prosecution charged d<span>’</span>Estree with three counts of att<span></span>empt to </div>
<div>commit aggravated robbery under three different theories, but the </div>
<div>district court did not require that the prosecution elect <span></span>a specific </div>
<div>theory; rather, it exercised its discretion to simply impose </div>
<div>concurrent sentences for each of the theories under which d<span>’</span>Estr<span></span>ee </div>
<div>was found guilty.  <span> </span>
</div>
</div>
<a href="#pf9" data-dest-detail='[9,"XYZ",69,170,null]'><div style="border-style:none;position:absolute;left:262.289444px;bottom:877.999444px;width:10.080000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pfa" data-page-no="a">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM9/Zgu/MM9ZguMTW/pwsU7Hj38Z0aT83wGmUtrM/47S7PRRijEBs%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=iPEvkU5OC5FPi4N1AiFHuUk9Opc%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>7 </div>
<div>criminal attempt; and (4) given his youth, his sentence to life </div>
<div>without the possibility of parole for felony murder is </div>
<div>unconstitutional.  <span> </span>
</div>
<div>¶ 15<span> </span><span>We conclude that, in gathering evidence from d<span>’</span><span>Estree<span>’</span></span>s cell </span>
</div>
<div>phone, police violated the Fourth Amendment and that no </div>
<div>exceptions to the warrant requirement apply, and that the error in </div>
<div>allowing the evidence was not harmless beyond a reasonable <span></span>doubt<span>. </span> </div>
<div>We thus reverse his convictions and remand the case for a new </div>
<div>trial.  We need not address d<span>’</span><span>Estree<span>’</span></span>s other contentions because </div>
<div>they may not arise on retrial<span>. </span> <span>See People v. Cook</span><span>,</span><span> </span>
197 P.3d 269
, </div>
<div>277 (Colo. App. 2008)<span>.  </span><span> </span>
</div>
<div>II.<span> <span>Phone Search Conducted Pursuant to the Second Warrant </span></span>
</div>
<div>¶ 16<span> </span><span>As to the second warrant, d<span>’</span>Estree argues that (1) police<span>’</span>s use </span>
</div>
<div>of the PIN code</div>
</div>
<div><div>4</div></div>
<div>
<div> violated the independent source doctrine because </div>
<div>the PIN code was discovered during the first suppressed sea<span></span>rch and </div>
<div>was improperly used in preparing and executing the second </div>
<div>warrant; (2) collecti<span>ng</span> the PIN code through a brute force attack </div>
<div> </div>
</div>
<div><div>4</div></div>
<div>
<div> Where possible, we refer to the specific combination requir<span></span>ed to </div>
<div>access d<span>’</span><span>Estree</span><span>’s phone as a “</span>PIN <span>code,”</span> though we also </div>
<div>occasionally refer to “passwords” in a broader <span>sense, and case law </span>
</div>
<div>and the record occasionally refer to <span>“password” or “pass code.” </span>  </div>
</div>
<a href="#pfa" data-dest-detail='[10,"XYZ",69,137,null]'><div style="border-style:none;position:absolute;left:220.058889px;bottom:335.135556px;width:10.080000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pfb" data-page-no="b">
<div><div>
<div>8 </div>
<div>constituted a search in violation of the Fourth Amendment; and (3) </div>
<div>the inevitable discovery doctrine does not apply. <span> </span>
</div>
<div>¶ 17<span> </span><span>These contentions were preserved.  <span>See People v. Tallent</span><span>, <span></span>2021 </span></span>
</div>
<div>CO 68, ¶ 12<span>; </span><span>People v. McFee</span>, 
2016 COA 97
, ¶ 31.   </div>
<div>A.<span> <span>Additional Background </span></span>
</div>
<div>1.<span> <span>The First Warrant </span></span>
</div>
<div>¶ 18<span> </span><span>The challenged cell phone evidence result<span>ed</span> from two separate </span>
</div>
<div>search warrants, the first of which the court declared invalid<span>.  </span>In </div>
<div>the first warrant, police requested authorization to search d<span>’</span><span>Estre<span></span>e<span>’</span><span>s </span></span>
</div>
<div>cell phone <span>for</span> the following information:  </div>
<div>1. <span>Specialized Location Records:<span> </span></span>All call, text </div>
<div>and data connection location information, </div>
<div>related to all specialized carrier records <span>. . . <span>. </span></span>
</div>
<div>Historical GPS/Mobile Locate Information </div>
<div>which shows GPS location (longitude and </div>
<div>latitude) and Cell-Site and sector of the device </div>
<div>in relationship to the network when connected </div>
<div>to the network. . . . </div>
<div>2. <span>Electronically Stored Records: </span>All records </div>
<div>associated with the identified cell phone<span>[]</span>, to </div>
<div>include all stored communication or files, </div>
<div>including voice mail, text messages, including </div>
<div>numbers text to and received from and all </div>
<div>related content, e-mail, digital images (e.g. </div>
<div>pictures), contact lists, video calling, web </div>
<div>activity (name of web site or application visited </div>
<div>or accessed), domain accessed, data </div>
<div>connections (to include Internet Service </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pfc" data-page-no="c">
<div><div>
<div>9 </div>
<div>Providers (ISPs), Internet protocol (IP) </div>
<div>addresses, (IP) Session data, (IP) Destination </div>
<div>Data, bookmarks, data sessions, name of web </div>
<div>sites and/or applications accessed), date and </div>
<div>time when all web sites, applications, and/or </div>
<div>third party applications were accessed and the </div>
<div>duration of each web site, application, and/or </div>
<div>third party application was accessed, and any </div>
<div>other files including all cell site and sector </div>
<div>information associated with each connection </div>
<div>and/or record associated with the cell. </div>
<div>A judicial officer approved the first warrant on November 20, 201<span></span>9<span>, </span>
</div>
<div>even though the warrant had no subject-matter or date limits<span>.  </span> </div>
<div>¶ 19<span> </span><span>Dawn Fink, who was admitted as a police expert in <span>“</span>digital </span>
</div>
<div>forensic analysis<span>”</span> during a pretrial hearing, testified that, in </div>
<div>analy<span>zing <span>a <span>cell phone, she typically extracts all electronic </span></span></span>
</div>
<div>information contained on the phone, unless the warrant has </div>
<div>co<span>nstraints.  Fink then provides all of the extracted data in a </span>
</div>
<div>readable format to detectives, who search through the data within<span></span> </div>
<div>the scope of the warrant.  The search tools available to her could </div>
<div>not first limit the extraction by date<span>.  </span><span> </span>
</div>
<div>¶ 20<span> </span><span>A return and inventory dated December 18, 2019, d<span></span>etailed </span>
</div>
<div>that no downloads of d<span>’</span><span>Estree<span>’</span></span>s phone could yet be completed </div>
<div>pursuant to the first warrant because the phone was <span>“</span>password </div>
<div>protected.<span>”</span><span>  <span>To gain access to the phone, police had earlier reache<span></span>d </span></span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pfd" data-page-no="d">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM9/Zgu/MM9ZguMTW/pwsU7Hj38Z0aT83wGmUtrM/47S7PRRijEBs%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=iPEvkU5OC5FPi4N1AiFHuUk9Opc%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>10 </div>
<div>out to the United States Secret Service (USSS) in November 2019.</div>
</div>
<div><div>5</div></div>
<div>
<div>  </div>
<div>Police took d<span>’</span><span>Estree<span>’</span></span>s phone to the <span>USSS</span>, which installed </div>
<div>“<span>Cellebrite,</span>”<span> its </span>“<span>advanced tool,</span>”<span> on the phone <span>to</span> initiate a </span>“<span>brute </span>
</div>
<div>force attack<span>.”</span><span>  </span>A brute force attack<span> </span>uses a computer program <span>to</span> test </div>
<div>every possible combination of a PIN code (here, a six-digit numeric </div>
<div>code) until it finds the correct PIN code to access data in the device<span>.  </span><span> </span>
</div>
<div>¶ 21<span> </span><span>After installing Cellebrite<span>, </span>the <span>USSS</span> returned the phone to </span>
</div>
<div>local police<span>.  </span>Fink testified that police <span>“</span>waited three months or so till </div>
<div>[Cellebrite] cracked th<span>e </span><span>code.<span>”</span></span><span>  </span>Fink testified that the timeframe for </div>
<div>a brute force attack to test every possible combination for a six-digit </div>
<div>PIN code was anywhere from <span>“</span>a week to eleven years.<span>”</span><span>  </span> </div>
<div>¶ 22<span> </span><span>Once the Cellebrite software discovered the PIN code, Fink </span>
</div>
<div>returned to the <span>USSS</span> to re-connect the phone to Cellebrite to </div>
<div>access the PIN code<span>’</span>s digits<span>.  </span>With the PIN code in hand, Fink </div>
<div>testified that she then extracted all of the information from </div>
<div>d<span>’</span><span>Estree<span>’</span><span>s phone in February 2020, and she provided all t<span></span>he data to </span></span>
</div>
<div>detectives.  <span> </span>
</div>
<div> </div>
</div>
<div><div>5</div></div>
<div>
<div> Fink could not specify exactly when in November 2019 police too<span></span>k </div>
<div>the phone to the USSS. </div>
</div>
<a href="#pfd" data-dest-detail='[13,"XYZ",69,104,null]'><div style="border-style:none;position:absolute;left:663.677778px;bottom:877.999444px;width:10.090000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pfe" data-page-no="e">
<div><div>
<div>11 </div>
<div>¶ 23<span> </span><span>D<span>’</span><span>Estree moved to suppress <span>th</span><span>e </span>results of the first search in </span></span>
</div>
<div>March 2021.  D<span>’</span>Estree argued that (1) the search occurred without </div>
<div>a warrant, as the first warrant did not authorize police to </div>
<div>indefinitely hold the phone; (2) the warrant violated Crim. P. </div>
<div>41(d)(5)(VI) and section 16-3-305(6), C.R.S. 2024<span>, </span>because it was </div>
<div>executed more than fourteen days after the warrant was issued; </div>
<div>and (3) the search was an unlawful general search.  <span> </span>
</div>
<div>¶ 24<span> </span><span>The district court found, in May 2021, that while the warrant </span>
</div>
<div>was executed beyond the fourteen-day limit, thus violating Crim. P. </div>
<div>41(d)(5)(VI) and section 16-3-305(6), the timing alone did not merit </div>
<div>suppression.  Relying on <span>People v. Coke</span>, 
2020 CO 28
, ¶¶ <span>33</span>-38, </div>
<div>however, the district court concluded that the warrant lacked </div>
<div>sufficient particularly and was a prohibited general warrant. <span></span> The </div>
<div>first warrant <span>“</span>permitted law enforcement to search and seize the </div>
<div>entire contents of the <span>[i]</span>Phone; there were no limitations.  Notably,<span></span> </div>
<div>there were no subject matter or time limitations on t<span></span>he information </div>
<div>to be seized.  Such a broad authorization violates the particularity </div>
<div>requirement demanded by the Fourth Amendment.<span>”</span><span>  </span>Thus, the </div>
<div>court suppressed the evidence gathered from the full extra<span></span>ction of </div>
<div>d<span>’</span><span>Estree<span>’</span><span>s phone.  <span> </span></span></span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pff" data-page-no="f">
<div><div>
<div>12 </div>
<div>¶ 25<span> </span><span>The prosecution next requested that the district court </span>
</div>
<div>reconsider its ruling, arguing that <span>—</span> even though the warrant </div>
<div>lacked a search timeframe <span>—</span> when the warrant was read with t<span></span>he </div>
<div>accompanying affidavit, it was sufficiently particular and police </div>
<div>acted in good faith<span>.  </span>Suppression of this <span>“</span><span>critical<span>”</span></span> evidence was </div>
<div>therefore unwarranted, the prosecution argued.  The district court </div>
<div>rejected these arguments.  <span> </span>
</div>
<div>2.<span> <span>The Second Warrant </span></span>
</div>
<div>¶ 26<span> </span><span>With the evidence from the first search suppressed, police </span>
</div>
<div>sought a second warrant to extract information from d<span>’</span><span>Estree<span>’</span></span>s cell </div>
<div>phone.  This time, the warrant specified that it sought inf<span></span>ormation </div>
<div>from <span>“</span>October 1, 2019 - November 12, 2019<span>”</span> relating to the </div>
<div>homicide<span>.  <span>The warrant requested the following information: </span></span>
</div>
<div>•<span> <span>Data which tends to show possession, </span></span>
</div>
<div>dominion and control over said equipment, </div>
<div>including device and system ownership </div>
<div>information (telephone number, ESN </div>
<div>number, serial number, IMEI, IMSI, CCID); </div>
<div>•<span> <span>Passwords, encryption keys, codes, and/or </span></span>
</div>
<div>other devices or information that may be </div>
<div>necessary to access the device and its </div>
<div>contents; </div>
<div>•<span> <span>Date/time, language, and other settings </span></span>
</div>
<div>preferences to include wireless local area </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf10" data-page-no="10">
<div><div>
<div>13 </div>
<div>network setting(s), Bluetooth settings to </div>
<div>include device name(s), hotspot SSID </div>
<div>(name), and MAC address and connection </div>
<div>dates and times to the device; </div>
<div>•<span> <span>System and device usage files, logs, and </span></span>
</div>
<div>databases utilized to record device activities </div>
<div>such as lock/unlock activities, powering </div>
<div>on/off cycles, installation and deletions </div>
<div>records; </div>
<div>•<span> <span>Telephone contact lists, phone books and </span></span>
</div>
<div>telephone logs; </div>
<div>•<span> <span>Data contained in notes, reminders, </span></span>
</div>
<div>documents, calendars and/or other similar </div>
<div>applications that relates to the planning and </div>
<div>commission of the attempt[ed] Homicide/ </div>
<div>Homicide that occurred between October 1, </div>
<div>2019 - November 12, 2019; </div>
<div>•<span> <span>Communications made, stored, sent, </span></span>
</div>
<div>received or deleted that relate to the </div>
<div>planning and commission of the attempt[ed] </div>
<div>Homicide/Homicide that occurred between </div>
<div>October 1, 2019 <span>‑</span> November 12, 2019; </div>
<div>•<span> <span>Photos and videos created, stored, sent, </span></span>
</div>
<div>received or deleted, or documents </div>
<div>containing such photographs or videos that </div>
<div>relate to the planning and commission of </div>
<div>the attempt[ed] Homicide/Homicide that </div>
<div>occurred between October 1, 2019 - </div>
<div>November 12, 2019; </div>
<div>•<span> <span>All electronic files, data, videos, and </span></span>
</div>
<div>communications, including related </div>
<div>metadata and location data, stored, sent, </div>
<div>received or deleted from social media and </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf11" data-page-no="11">
<div><div>
<div>14 </div>
<div>third-party applications located on the </div>
<div>device that relate to the planning and </div>
<div>commission of the attempt[ed] Homicide/ </div>
<div>Homicide that occurred between October 1, </div>
<div>2019 - November 12, 2019; </div>
<div>•<span> <span>Communications through the </span></span>
</div>
<div>SIRI/(GOOGLE ASSISTANT system<span>[)]</span><span>, </span>
</div>
<div>including all communications entered </div>
<div>and/or recorded into the system as well as </div>
<div>communicated from the system to the user </div>
<div>that relate to the attempt[ed] Homicide/ </div>
<div>Homicide that occurred between October 1, </div>
<div>2019 <span>–</span> November 12, 2019; </div>
<div>•<span> <span>Global position system (GPS) data and any </span></span>
</div>
<div>other geolocation data that relates to the </div>
<div>planning and commission of the attempt[ed] </div>
<div>Homicide/Homicide that occurred between </div>
<div>October 1, 2019 <span>‑</span> November 12, 2019; </div>
<div>•<span> <span>Records of internet activity that relates to </span></span>
</div>
<div>the planning and commission of the </div>
<div>attempt[ed] Homicide/Homicide that </div>
<div>occurred between October 1, 2019- </div>
<div>November 12, 2019, including internet </div>
<div>protocol (IP) addresses and Port IDs, firewall </div>
<div>logs, transactions with internet hosting </div>
<div>providers, co-located computer systems, </div>
<div>cloud computing services, caches, browser </div>
<div>history and cookies, <span>“</span><span>bookmarked<span>”</span></span> <span>or </span>
</div>
<div>“<span>favorite</span>”<span> web pages, search terms that the </span>
</div>
<div>user entered into any internet search </div>
<div>engine, and records of user-typed we<span>b </span>
</div>
<div>addresses pertaining to violations of the law </div>
<div>or that show who used, owned, possessed, </div>
<div>or controlled the device(s). </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf12" data-page-no="12">
<div><div>
<div>15 </div>
<div>The district court approved the second warrant on October 11, </div>
<div>2021.  <span>After d’Estree’s</span> arrest, the phone had remained in police </div>
<div>custody (except for the brief times the USSS handled <span></span>it).<span> </span>
</div>
<div>¶ 27<span> </span><span>Fink conducted the second extraction seeking to collect all </span>
</div>
<div>information from the phone, without limitation, to ensure no </div>
<div>relevant information was missed<span>, </span>but this time she provided the </div>
<div>detectives only data within the dates specified <span>in</span> the warrant.  Fink </div>
<div>also explained that a new tool available after the first warrant<span>, </span>
</div>
<div>“<span>GrayKey,</span>”<span> was used to conduct the extraction, which allowed p<span></span>olice </span>
</div>
<div>to conduct three types of extractions:<span> </span><span>a <span>“</span></span>partial BFU<span>”</span> (before first </div>
<div>unlock), an <span>“</span>instant AFU<span>”</span> (after first unlock), or a <span>“</span>full-file system<span>”</span> </div>
<div>AFU extraction.  Fink testified that a partial BFU extracti<span></span>on </div>
<div>“<span>provides generally just system data,</span>”<span> and occasionally some </span>
</div>
<div>photos, and is used <span>“</span>to see if there<span>’</span>s any information to potentially </div>
<div>find [PIN] codes for the device<span>.”</span>  This type of extraction is the only </div>
<div>extraction available without a PIN code.  Having a PIN code enables </div>
<div>conducting an AFU extraction, with the <span>“</span>full-file system<span>”</span> AFU </div>
<div>providing all information on a device, but it could take years t<span></span>o </div>
<div>crack the PIN code<span>.  </span><span> </span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf13" data-page-no="13">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>16 </div>
<div>¶ 28<span> </span><span>Fink conducted a BFU extraction on October 12, 2021, and </span>
</div>
<div>then initiated a brute force attack.  Fink allow<span>ed</span> the prog<span></span>ram to run </div>
<div>for seven days without success; then she abandoned the brute force </div>
<div>attack in favor of expediting the process by using a six-digit code </div>
<div>she found on the back of the phone <span>—</span> d<span>’</span><span>Estree<span>’</span></span><span>s </span>PIN code <span>—</span> to </div>
<div>unlock the phone and conduct the AFU.</div>
</div>
<div><div>6</div></div>
<div>
<div>  <span>It is unclear exactly how </span>
</div>
<div>the PIN code came to be adhered to the phone after the first <span></span>search </div>
<div>—<span> there is no evidence indicating that the PIN code was originally </span>
</div>
<div>there <span>—</span> and Fink conceded that the <span>USSS</span> <span>“</span>could have<span>”</span> placed the </div>
<div>code there.  <span> </span>
</div>
<div>¶ 29<span> </span><span>Once the PIN code unlocked the phone on October 18, Fink </span>
</div>
<div>conducted a full-file system AFU extraction with GrayKey, </div>
<div>downloaded the phone<span>’</span>s contents, and then used Cellebrite t<span></span>o </div>
<div>“<span>decode</span>”<span> the raw data.  Once decoded, Fink used Cellebrite to sel<span></span>ect </span>
</div>
<div>only data from October 1 <span>to</span> November 12, 2019 (the range specified </div>
<div> </div>
</div>
<div><div>6</div></div>
<div>
<div> Fink testified that she tried birthdates and the PIN code on the </div>
<div>phone as these numbers were “suggested” to her after the <span></span>first </div>
<div>seven days of the brute force attack proved unsuccessful.<span></span>  There is </div>
<div>no evidence in the record that the PIN code changed between the </div>
<div>first and second search<span>es</span>, so we assume that the PIN code Fink </div>
<div>used is the same one that police used to first access the phone. </div>
</div>
<a href="#pf13" data-dest-detail='[19,"XYZ",69,170,null]'><div style="border-style:none;position:absolute;left:440.117778px;bottom:668.022222px;width:10.080000px;height:32.860000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf14" data-page-no="14">
<div><div>
<div>17 </div>
<div>in<span> the warrant), and provided this information to police in <span></span>a <span>“</span><span>user-</span></span>
</div>
<div>friendly<span>”</span><span> report.<span>  </span><span> </span></span>
</div>
<div>¶ 30<span> </span><span>Holloway testified that, when drafting the second warrant </span>
</div>
<div>application and affidavit, he relied on information <span>“</span>[f]rom the first </div>
<div>warrant<span>”</span><span> but did not place any information learned from the </span>
</div>
<div>suppressed search into the second warrant application.<span>  </span>Beyond </div>
<div>limiting the scope to specific dates<span>, </span>the <span>“</span>only thing that was added </div>
<div>[w<span>as<span>] . . . some explanations of cell phone capabilities.<span>”</span><span>  </span><span> </span></span></span>
</div>
<div>¶ 31<span> </span><span>D<span>’</span><span>Estree challenged the second warrant, arguing that <span>it</span> (1) </span></span>
</div>
<div>was not independent of the first warrant<span>’</span>s illegality; (2) relied on </div>
<div>suppressed evidence, including the PIN code; and (3) did not cabin </div>
<div>the police<span>’</span>s search, which also exceeded the warrant<span>’</span>s legitimat<span></span>e </div>
<div>scope.  Allowing this evidence would also be unfair, d<span>’</span>Estree arg<span></span>ued.   </div>
<div>¶ 32<span> </span><span>The district court declined to suppress the cell phone evidence </span>
</div>
<div>gathered pursuant to the second warrant.<span>  </span><span> </span>
</div>
<div>¶ 33<span> </span><span>The district court found that police sought the second warrant </span>
</div>
<div>for reasons independent of information learned from t<span></span>he first, thus </div>
<div>me<span>eting the <span>“</span>independent source doctrine<span>”</span> criteria. <span> </span>It noted that <span> </span></span>
</div>
<div>[t]he Second Affidavit was essentially the same </div>
<div>as the First Affidavit with three exceptions: (1) </div>
<div>a reference to the court<span>’</span>s prior suppression </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf15" data-page-no="15">
<div><div>
<div>18 </div>
<div>orders; (2) an expanded explanation of </div>
<div>cellphone capabilities; and (3) inclusion of the </div>
<div>Second Date Range.  Of significance here, </div>
<div>nothing in the Second Affidavit referenced the </div>
<div>information seized in the February Search. </div>
<div>It also found that Holloway<span>’</span>s testimony <span>—</span> that he did not rely on </div>
<div>information from the first suppressed search <span>—</span> was credible an<span></span>d </div>
<div>noted that there was no contrary evidence<span>.  </span> </div>
<div>¶ 34<span> </span><span>Regarding use of the PIN code (found on the back of the </span>
</div>
<div>phone), the district court said that suppression was unwarranted </div>
<div>for two reasons.  First, the district court concluded that the </div>
<div>retrieval of the PIN code through a brute force attack during </div>
<div>execution of the first warrant did not constitute a Fourth </div>
<div>Amendment search.  Recognizing that there were no Colorado ca<span></span>ses </div>
<div>on the issue, it analogized to how police officers execute se<span></span>arch </div>
<div>warrants against a locked house.  Police may break into a home t<span></span>o </div>
<div>execute a search warrant and the actual breach of t<span></span>he home <span>—</span> via </div>
<div>a door or through a window <span>—</span> is not a search; rather, it is <span></span>a </div>
<div>“means” to conduct a search.  <span> </span>
</div>
<div>¶ 35<span> </span><span>The court also found that the discovery of the PIN code fell </span>
</div>
<div>within the <span>“</span>inevitable discovery<span>”</span> exception to the exclusionary <span></span>rule, </div>
<div>noting that, <span>“</span>[e]ven though it was listed on the back of the </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf16" data-page-no="16">
<div><div>
<div>19 </div>
<div>cellphone[,] <span>. . . </span>if it had not been available, law enforcement would </div>
<div>have obtained it through the [<span>USSS</span>] or its own software.<span>”</span><span>  </span>It also </div>
<div>noted that case law <span>“</span>has not distinguished between evidence that </div>
<div>would have been discovered quickly and evidence that would <span></span>have </div>
<div>taken much longer to discover.<span>”</span><span>  </span>Thus, because the PIN code would </div>
<div>have been revealed once all possible combinations were tested, </div>
<div>there was a <span>“</span>reasonable probability<span>”</span> <span>—</span> indeed, the court found, </div>
<div>because there was a finite number of possible combi<span></span>nations, there </div>
<div>was <span>a “100% probability” —</span> that the PIN would have been </div>
<div>discovered eventually<span>.  </span>The district court rejected the defense<span>’</span><span>s </span>
</div>
<div>fairness argument as unsupported by case law.   </div>
<div>B.<span> <span>Standard of Review and Applicable Law </span></span>
</div>
<div>¶ 36<span> <span>“Whether evidence should be suppressed is a mixed question </span></span>
</div>
<div>of law and fact.  As a result, we defer to the trial court<span>’</span>s factual </div>
<div>findings if they are supported by competent evidence, but we <span></span>review </div>
<div>the legal effect of those findings de novo.<span>”</span>  <span>People v. Seymour</span>, 202<span></span>3 </div>
<div>CO 53, ¶ 19 (citation omitted). <span>  </span> </div>
<div>¶ 37<span> <span>“<span>The United States and Colorado Constitutions protect </span></span></span>
</div>
<div>individuals against <span>‘</span>unreasonable searches and seizures.<span>’”</span>  <span>I<span></span>d. <span>at </span></span>
</div>
<div>¶ <span>20</span> (quoting U.S. Const. amend. IV<span>; </span>Colo. Const. art. II, § 7).  <span></span><span>A </span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf17" data-page-no="17">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM9/Zgu/MM9ZguMTW/pwsU7Hj38Z0aT83wGmUtrM/47S7PRRijEBs%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=iPEvkU5OC5FPi4N1AiFHuUk9Opc%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>20 </div>
<div>“<span>search</span>”<span> within the meaning of the Fourth Amendment </span>“<span>occurs </span>
</div>
<div>when the government infringes on an individual<span>’</span>s reasonable </div>
<div>expectation of privacy.<span>”</span>  <span>Id. </span>(citing <span>Katz v. United Stat<span></span>es<span>, 389 U.S. </span></span>
</div>
<div>347, 361 (1967) (Harlan J., concurring))<span>.  </span>The <span>“‘<span>seizure</span><span>’</span></span> of property </div>
<div>occurs when there is some meaningful interference with an </div>
<div>individual<span>’</span><span>s possessory interests in that property.<span>”</span>  <span>Id. </span>(quoting </span>
</div>
<div>United States v. Jacobsen<span>, 
466 U.S. 109
, 113 (1984)).  <span>“</span>[T]o deter </span>
</div>
<div>police misconduct<span>”</span> and discourage illegal searches<span>, <span>“</span></span>the </div>
<div>exclusionary rule requires courts to suppress evidence at <span></span>trial if the </div>
<div>government acquired it in violation of constitutional <span></span>protections.<span>”</span>
</div>
</div>
<div><div>7</div></div>
<div>
<div>  </div>
<div>Id. <span>at <span>¶ </span>62.   </span>
</div>
<div>¶ 38<span> </span><span>A <span>warrant is generally required before cell phone data can be </span></span>
</div>
<div>searched.  <span>See</span> <span>Riley v. California</span>, 
573 U.S. 373
, 386, 393-<span>98,</span> <span></span><span>401<span>-</span></span>
</div>
<div>403 (2014) (recognizing the ubiquity of cell phones, their immense </div>
<div>storage capacity, and their potential to store deeply personal </div>
<div>information)<span>.  <span>Our state supreme court has also <span>“</span>acknowledged the </span></span>
</div>
<div>special protections applicable to cell phone searches.<span>”</span><span>  </span><span>People v. </span>
</div>
<div> </div>
</div>
<div><div>7</div></div>
<div>
<div> <span>The exclusionary rule “</span>applies both to illegally obtained evidence </div>
<div>and to derivative evidence <span>—</span> often called <span>‘</span>fruit of the poisonou<span></span>s </div>
<div>tree.<span>’”  <span>People v. Dominguez-Castor<span>, 
2020 COA 1
, ¶ 19 (quoting </span></span></span>
</div>
<div>People v. Schoondermark<span>, 
759 P.2d 715
, 718 (Colo. 1988)).  </span>
</div>
</div>
<a href="#pf17" data-dest-detail='[23,"XYZ",69,137,null]'><div style="border-style:none;position:absolute;left:659.026667px;bottom:499.981667px;width:10.080000px;height:32.860000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf18" data-page-no="18">
<div><div>
<div>21 </div>
<div>Davis<span>, 
2019 CO 24
, ¶ 19; <span>see also <span>Coke</span></span>, ¶ 38 (warrant to search a </span>
</div>
<div>cell phone that <span>“</span>permitted the officers to search all texts, videos, </div>
<div>pictures, contact lists, phone records, and any data <span></span>that showed </div>
<div>ownership or possession<span>”</span> violated the Fourth Amendment<span>’</span><span>s </span>
</div>
<div>particularity requirement).  Indeed, <span>“</span>the general trend of caselaw </div>
<div>provides cell phones with more protection, not less.<span>”</span>  <span>Davis</span>, <span></span>¶ 17. </div>
<div>¶ 39<span> </span><span>Preserved errors concerning the admission of evidence in </span>
</div>
<div>violation of the Fourth Amendment implicate <span>“</span>trial errors of </div>
<div>constitutional dimension,<span>”</span> and thus we review any such error for </div>
<div>“constitutional harmless error.”  <span>Hagos v. People<span>, 
2012 CO 63
, ¶ 11.</span> <span> </span></span>
</div>
<div>“<span>These errors require reversal unless the reviewing court <span></span>is <span>‘</span>able to </span>
</div>
<div>declare a belief that [the error] was harmless beyond a reason<span></span>able </div>
<div>doubt.<span>’”</span><span>  <span>Id.</span> (alteration in original) (quoting <span>Chapman v. Ca<span></span>lifornia<span>, </span></span></span>
</div>
<div>
386 U.S. 18
, 24 (1967)).   </div>
<div>C.<span> <span>Analysis </span></span>
</div>
<div>1.<span> <span>The Independent Source Doctrine  </span></span>
</div>
<div>¶ 40<span> </span><span>The independent source doctrine is an exception to the </span>
</div>
<div>exclusionary rule <span>and allows “</span>unconstitutionally obtained evid<span></span>ence </div>
<div>[to] be admitted if the prosecution can establish that<span></span> it was also </div>
<div>discovered by means independent of the illegality.<span>”</span>  <span>People v. </span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf19" data-page-no="19">
<div><div>
<div>22 </div>
<div>Dominguez-Castor<span>, <span>
2020 COA 1
, ¶ 20 (quoting <span>People v. Arapu</span>, 2012 </span></span>
</div>
<div>CO 42, ¶ 29)<span>; </span><span>see also People v. Thompson</span>, 
2021 CO 15
, ¶ 21.<span>  </span>The </div>
<div>doctrine may apply to <span>“</span>evidence seized under a valid warrant<span></span> issued </div>
<div>after the evidence was first discovered during execution of <span></span>an </div>
<div>invalid warrant . . . if the prosecution shows that the second </div>
<div>warrant was truly independent of information obtained fr<span></span>om the </div>
<div>initial search.<span>”</span><span>  </span><span>Dominguez-Castor</span><span>, </span>¶ <span>22<span>. </span></span> The decision to seek an </div>
<div>additional warrant because of a suppression order<span>’s consequenc<span></span>es<span> </span></span>
</div>
<div>does not, <span>on</span> its own, violate the independent source doctrine.<span></span>  </div>
<div>People v. George<span>, 
2017 COA 75
, ¶ <span>55</span><span>. </span> </span> </div>
<div>¶ 41<span> </span><span>A second warrant meets the criteria of the independent source </span>
</div>
<div>doctrine if the prosecution proves, by a preponderance of the </div>
<div>evidence, that <span>“</span>(1) the decision to seek the warrant was not </div>
<div>prompted by what was observed during the initial unlawf<span></span>ul search, </div>
<div>and (2) no information obtained during the initial search wa<span></span>s relied </div>
<div>upon by the magistrate in issuing the warrant.<span>”</span><span>  </span><span>Dominguez-Cast<span></span>or<span>, </span></span>
</div>
<div>¶ <span>21</span><span>; </span><span>see also Thompson</span>, ¶ 22.  It is a question of fact for the </div>
<div>district court <span>“</span>[w]hether the police would have pursued a second </div>
<div>search even absent what they discovered during an earlier unlawf<span></span>ul </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf1a" data-page-no="1a">
<div><div>
<div>23 </div>
<div>search . . . .  <span>We</span> will not disturb the court<span>’</span>s finding if it has rec<span></span>ord </div>
<div>support.<span>”</span><span>  </span><span>Dominguez-Castor</span><span>, ¶ 34.   </span>
</div>
<div>¶ 42<span> </span><span>The reasoning behind the independent source doctrine, </span>
</div>
<div>articulated in <span>Nix v. Williams</span>, is that </div>
<div>the interest of society in deterring unlawful </div>
<div>police conduct and the public interest in </div>
<div>having juries receive all probative evidence of a </div>
<div>crime are properly balanced by putting the </div>
<div>police <span>in the same, not a worse, position that </span>
</div>
<div>they would have been in if no police error or </div>
<div>misconduct had occurred<span>.  <span>When the </span></span>
</div>
<div>challenged evidence has an independent </div>
<div>source, exclusion of such evidence would put </div>
<div>the police in a worse position than they would </div>
<div>have been in absent any error or violation. </div>
<div>
467 U.S. 431
, 4<span>43</span> (1984) (emphasis added) (citations and footnote </div>
<div>omitted).  Put another way, <span>“</span>while the government should not pr<span></span>ofit </div>
<div>from its illegal activity, neither should it be placed in a worse </div>
<div>position than it would otherwise have occupied.<span>”</span><span>  </span><span>Murray v. Unit<span></span>ed </span>
</div>
<div>States<span>, 
487 U.S. 533
, 542 (1988).  </span>
</div>
<div>¶ 43<span> <span>The district court deemed Holloway’s testimony —<span> averring </span></span></span>
</div>
<div>that the information from the first suppressed search did not <span></span>inform </div>
<div>the second warrant application or the decision to seek t<span></span>he second </div>
<div>warrant <span>—</span> credible.  <span>See Dominguez-Castor</span>, ¶ 21.  We may not </div>
<div>disturb this credibility determination.  <span>See Seymo<span>ur</span></span>, ¶ 20.  Nor does </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf1b" data-page-no="1b">
<div><div>
<div>24 </div>
<div>the second warrant reference information learned during t<span></span>he first </div>
<div>search on which <span>a </span>judicial officer could have improperly relied.  <span>See </span>
</div>
<div>Dominguez-Castor<span>, ¶ 21.   </span>
</div>
<div>¶ 44<span> </span><span>But <span>d’Estree </span>challenges the independence of the second </span>
</div>
<div>warrant because he argues it sought information that police had </div>
<div>discovered during the first search and knew existed<span>.  T</span>herefore, he </div>
<div>contends the second warrant relied on information illegally o<span></span>btained </div>
<div>in the first search<span>.  For example, d’Estree points to the second </span>
</div>
<div>warrant’s request for information on any “search terms that<span></span> the </div>
<div>user entered into any internet search engine” as problematic. <span></span> </div>
<div>D’Estree argues <span>that the object of this request was to gather his </span>
</div>
<div>kn<span>own internet search history (which was introduced at <span></span>trial), and </span>
</div>
<div>improperly relied on information gathered in the first search.   </div>
<div>¶ 45<span> </span><span>But the first warrant request, while not as specific, requested </span>
</div>
<div>such information when it sought “web activity (name of web sit<span></span>e or </div>
<div>application visited or accessed), domain accessed, data connecti<span></span>ons </div>
<div>(to include Internet Service Providers (ISPs), Internet protoc<span></span>ol (IP) </div>
<div>addresses, [and] (IP) Session data.”  The second warrant’s request </div>
<div>with additional specificity does not necessarily show that <span></span>the </div>
<div>second warrant relied on information improperly gained fr<span></span>om the </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf1c" data-page-no="1c">
<div><div>
<div>25 </div>
<div>first search.  <span>See id.</span> <span>at</span> ¶ 14 &amp; n.2 <span>(second warrant contained “m<span></span>uch </span>
</div>
<div>more information than the first” in light of<span> </span>police’s increased </div>
<div>training on search warrants for cell phones).   </div>
<div>¶ 46<span> </span><span>As a result, the second warrant itself meets the criteria </span>
</div>
<div>detailed in <span>Dominguez-Castor </span>for the independent source doctrine </div>
<div>exception<span>. <span> Had police relied on the second warrant alone to retrieve </span></span>
</div>
<div>the contents of d’Estree’s cell<span> phone, that would have been </span>
</div>
<div>permissible and the extracted evidence would have been prope<span></span>rly </div>
<div>admitted at trial.  But police used illegally obtained information </div>
<div>from the first warrant <span>—</span> the PIN code <span>—</span> in <span>executing</span> the second </div>
<div>warrant. </div>
<div>2.<span> <span>The Use of the PIN Code </span></span>
</div>
<div>¶ 47<span> </span><span>The PIN code was discovered during the execution of the first, </span>
</div>
<div>unlawful general warrant.  Police then used this illegally obtained </div>
<div>information to <span>expedite</span> the execution of the second warrant.  By </div>
<div>using the illegally obtained PIN code, police extracted a crucial </div>
<div>benefit <span>—</span> guaranteed access to the phone<span>’</span>s contents ahead of the </div>
<div>forthcoming December 2021 trial.  This conduct placed the </div>
<div>government in a better position than before the illegal search </div>
<div>occurred<span>.  <span>See Murray<span>, 487 U.S. at 542; </span><span>Nix</span></span>, <span>467<span> U.S. at 443.  So </span></span></span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf1d" data-page-no="1d">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM%2B/ua3/MM%2Bua3MxJTRbWtsh8MG8egWFOKEyWp9uEWUm7FEkRnsaA%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=O1l%2BvdDrwv4ybLvlhVNeSUN83Tw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>26 </div>
<div>while the second warrant was not infirm, the execution <span></span>of that </div>
<div>warrant most certainly was. </div>
<div>¶ 48<span> </span><span>A summary of the key dates relating to both warrants follows: </span>
</div>
<div> </div>
<div>Key Warrant Events </div>
<div>¶ 49<span> </span><span>Police and the prosecution had months to submit another </span>
</div>
<div>warrant application after the first warrant was invalidated, and </div>
<div>could have done so, but they did not request a second warrant until </div>
<div>about two months before trial.  The first brute force attack took </div>
<div>three months, and Fink testified that a brute force attack could </div>
<div>have taken up to eleven years, so there was no guarantee that </div>
</div>
<div>
<div>Nov. 20, </div>
<div>2019: </div>
<div>First </div>
<div>warrant </div>
<div>signed</div>
<div>Dec. 18, </div>
<div>2019: No      </div>
<div>download </div>
<div>possible </div>
<div>without PIN </div>
<div>code</div>
<div>Feb. 17, </div>
<div>2020: </div>
<div>Phone </div>
<div>unlocked </div>
<div>using </div>
<div>USSS-</div>
<div>provided </div>
<div>PIN code, </div>
<div>data </div>
<div>extracted</div>
<div>May 12, </div>
<div>2021: </div>
<div>Evidence </div>
<div>suppressed</div>
<div>Oct. 11, </div>
<div>2021: </div>
<div>Second </div>
<div>warrant </div>
<div>signed</div>
<div>Oct. 19, 2021: </div>
<div>Brute force </div>
<div>abandoned and </div>
<div>second </div>
<div>extraction using</div>
<div>PIN code</div>
<div>Nov. 23, </div>
<div>2021: </div>
<div>Court </div>
<div>permits </div>
<div>phone </div>
<div>evidence's </div>
<div>admission</div>
<div>Dec. 14 -</div>
<div>17, 2021: </div>
<div>Trial</div>
</div>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf1e" data-page-no="1e">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>27 </div>
<div>police would have gained access to the phone in time for trial </div>
<div>without<span> relying on the illegally obtained shortcut (the PIN code).</span>
</div>
</div>
<div><div>8</div></div>
<div>
<div>  <span> </span>
</div>
<div>¶ 50<span> </span><span>As the United States Supreme Court held in<span> Silverthorne </span></span>
</div>
<div>Lumber Co. v. United States<span>, 
251 U.S. 385
, 392 (1920), which </span>
</div>
<div>originated <span>the independent source doctrine, “[t]</span>he essence of a </div>
<div>provision forbidding the acquisition of evidence in a certain <span></span>way is </div>
<div>that not merely evidence so acquired shall not be used b<span></span>efore the </div>
<div>Court <span>but that it shall not be used at a<span></span>ll<span>.</span><span>” </span> <span>(Emphasis added.)   </span></span>
</div>
<div>¶ 51<span> </span><span>The second warrant authorized police to acquire the PIN code </span>
</div>
<div>via brute force attack; evidence on the phone so acquired would </div>
<div>have presumably met the independent source doctrine<span>.  <span>S<span>ee </span></span></span>
</div>
<div>Dominguez-Castor<span>, ¶ <span>21<span>.  </span></span>However, police abandoned the brute force </span>
</div>
<div>attack and, instead, took a different (and shorter) route to the </div>
<div>encrypted information using illegally obtained information (the PI<span></span>N </div>
<div>code) to <span>execute</span> the second warrant.  Law enforcement may not use </div>
<div>information obtained in violation of the Fourth Amendment<span>.  </span><span>See </span>
</div>
<div> </div>
</div>
<div><div>8</div></div>
<div>
<div> If the prosecution had pursued the second warrant imme<span></span>diately </div>
<div>after the information obtained with the first warrant was </div>
<div>suppressed in May 2021, even if it took three months (as it<span></span> had </div>
<div>before) to unlock the phone, there may have been substantially less </div>
<div>incentive to use the PIN code <span>to expedite access to the phone’s </span>
</div>
<div>contents before the December 14, 2021, trial start date<span>.  </span> </div>
</div>
<a href="#pf1e" data-dest-detail='[30,"XYZ",69,170,null]'><div style="border-style:none;position:absolute;left:644.345000px;bottom:835.986111px;width:10.080000px;height:32.880000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf1f" data-page-no="1f">
<div><div>
<div>28 </div>
<div>Silverthorne<span>,</span><span> <span>
251 U.S. at
392<span>.  </span>With this framework in mind, we </span></span>
</div>
<div>proceed to address <span>the district court’s other grounds for a<span></span>dmitting </span>
</div>
<div>the evidence.   </div>
<div>3.<span> <span>Whether a Brute Force Attack Constitutes a Search </span></span>
</div>
<div>¶ 52<span> </span><span>The district court also found that the use of a brute force </span>
</div>
<div>attack to discover a PIN <span>code and access d’Estree’s cell phone data </span>
</div>
<div>did not constitute a search under the Fourth Amendment <span></span>because </div>
<div>it was a “means” to execute a warrant rather than a search. <span></span> <span>It </span>
</div>
<div>analogized the issue as akin to when police execute a warrant<span></span> to </div>
<div>search a locked house <span>—</span> whether police choose to enter through </div>
<div>the door or a window is irrelevant.   </div>
<div>¶ 53<span> </span><span>Case law supports this general concept <span>—</span> most notably, as </span>
</div>
<div>pointed out by the district court and the People on appeal, in <span>Dalia<span></span> </span>
</div>
<div>v. U<span>nited States<span>, 
441 U.S. 238
 (1979).  There, a defendant </span></span>
</div>
<div>challenged a wiretap order granting the government <span></span>the authority to </div>
<div>“i<span>ntercept all oral communications taking place in petitioner<span>’</span>s office<span>” </span></span>
</div>
<div>through electronic surveillance.  <span>Id. </span>at 241-42.  The defendant </div>
<div>argued that the order violated the Fourth Amendment beca<span></span>use it </div>
<div>did not specify the means used to execute the warrant<span></span> (i.e., by </div>
<div>covert entry into the office)<span>.  </span><span>Id. </span>at 256-58.  The Supreme Court hel<span></span>d </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf20" data-page-no="20">
<div><div>
<div>29 </div>
<div>that “[n]<span>othing in the language of the Constitution or in this Court</span><span>’</span><span>s </span>
</div>
<div>decisions interpreting that language suggests that . . . <span></span>search </div>
<div>warrants also must include a specification of the precise mann<span></span>er in </div>
<div>which they are to be executed.”  <span>Id. <span>at 257.  Instead, the means of </span></span>
</div>
<div>executing a warrant are “generally l<span>eft to the discretion of t<span></span>he </span>
</div>
<div>executing officers . . . subject of course to the general Fourth </div>
<div>Amendment protection . . . [<span>, </span>and] the manner in which a warrant is </div>
<div>executed is subject to later judicial review as to its reas<span></span>onableness.”  </div>
<div>Id. <span>at 257-58.  </span>
</div>
<div>¶ 54<span> </span><span>But the means versus search distinction does not neatly fit<span></span> </span>
</div>
<div>here.  As the United States Supreme Court aptly recognized in <span>Riley </span>
</div>
<div>v. California<span>, analogizing the digital world and processes t<span></span>o the </span>
</div>
<div>physical world is difficult and unhelpful, and “[a]n analog<span></span>ue test </div>
<div>would <span>‘</span>keep defendants and judges guessing for years t<span></span>o come.<span>’<span>” </span></span> </div>
<div>573 U.S. at 401 (citation omitted).<span>  </span>The use of a brute force attack </div>
<div>to access a phone, <span>or any other means to obtain a phone’s </span>PIN code </div>
<div>without a defendant’s cooperation or consent, is f<span>undamentally </span>
</div>
<div>different from entry into a home with a warrant because a search </div>
<div>for the PIN <span>code itself, just like a search of a cell phone’s cont<span></span>ents, </span>
</div>
<div>is protected by the Fourth Amendment.  <span>See Davis</span>, ¶ 19; <span>Coke</span><span>, </span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf21" data-page-no="21">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>30 </div>
<div>¶ <span>38</span><span>; </span><span>Riley</span><span>, <span>573</span></span> U.S. <span>at</span> 386, 393-98, 401-<span>03</span> (recognizing that cell </div>
<div>phones hold “the privacies of life”<span> (quoting <span>Boyd v. United Stat<span></span>es<span>, </span></span></span>
</div>
<div>
116 U.S. 616
, 630 (1886))<span>).</span><span>  </span> </div>
<div>¶ 55<span> </span><span>While the protections the Fourth Amendment affords to </span>
</div>
<div>passwords and PIN codes allowing access to cell phones are less </div>
<div>clearly defined than those it affor<span>ds</span> t<span>o </span>physical spaces and the </div>
<div>personal data cell phones contain,</div>
</div>
<div><div>9</div></div>
<div>
<div> existing Fourth Amendment </div>
<div>principles, coupled with the recognition of the special <span></span>protections </div>
<div>afforded cell phones, support concluding that obtaining <span></span>a cell phone </div>
<div>PIN code without consent requires a warrant.  <span>See United Stat<span></span>es v. </span>
</div>
<div>Booker<span>,<span> <span>
561 F. Supp. 3d 924
, 9<span>29</span></span></span>-<span>32 <span>(S.D. Cal. 2021) (holding, in </span></span></span>
</div>
<div>part, that requiring defendant to involuntarily enter <span></span>his PIN code </div>
<div>while law enforcement watched and recorded it, before police </div>
<div>sought a warrant to search the phone using software that<span></span> required </div>
<div>the PIN code, violated the Fourth Amendment).<span> </span> </div>
<div> </div>
</div>
<div><div>9</div></div>
<div>
<div> The issues in this case are distinct from those in the Fifth </div>
<div>Amendment context centering on whether a defendant can be </div>
<div>compelled to provide a cell phone PIN code or unlock a device. <span></span> <span>See, </span>
</div>
<div>e.g.<span>, <span>Seo v. State</span>, 
148 N.E.3d 952
, 962 (Ind. 2020) (holding that </span>
</div>
<div>forcing a defendant to “<span>unlock her iPhone for law enforcement </span>
</div>
<div>would violate her Fifth Amendment right against self-</div>
<div>incrimination<span>”).  The Fifth Amendment is not at issue in this case.  <span> </span></span>
</div>
</div>
<a href="#pf21" data-dest-detail='[33,"XYZ",69,187,null]'><div style="border-style:none;position:absolute;left:389.658333px;bottom:625.983333px;width:10.080000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf22" data-page-no="22">
<div><div>
<div>31 </div>
<div>¶ 56<span> <span>Courts use “a two<span>-prong test to determine if a claimed privacy </span></span></span>
</div>
<div>interest warrants constitutional protection: (1) whether the </div>
<div>individual ‘exhibited an actual (subjective) expectation of privacy’ </div>
<div>and (2) whether, objectively, ‘the expectation [is] one that<span></span> so<span>ciety is </span>
</div>
<div>prepared to recognize as ‘reasonable.’”  <span>Seymour</span><span>, ¶ 22 (quoting </span>
</div>
<div>People v. Gutierrez<span>, 
222 P.3d 925
, 932 (Colo. 2009), in turn citing<span></span> </span>
</div>
<div>Katz<span>, 389 U.S. at 361).  </span>
</div>
<div>¶ 57<span> </span><span>Turning to the subjective expectation of privacy prong, there is </span>
</div>
<div>no evidence that d’Estree exhibited anything other than an </div>
<div>expectation that his PIN code would remain private.  This is </div>
<div>evidenced by the very fact that police had to use specialized </div>
<div>software to break into the phone because d’Estree did not <span></span>provide </div>
<div>the PIN code.  On this point, <span>Davis</span>, 
2019 CO 24
, provides some </div>
<div>insight.  There, the Colorado Supreme Court held that an individual </div>
<div>who voluntarily gave his phone’s <span>PIN code to law enforcement </span><span>—</span><span> </span>
</div>
<div>even for a limited purpose <span>—</span> <span>“</span>had no legitimate expectation of </div>
<div>privacy in the digits of his passcode<span>” and “</span>law enforcement<span>’</span><span>s </span>[later] </div>
<div>use of that passcode was not a search protected by the Fourth </div>
<div>Amendment.<span>”  <span>Id. <span>at <span>¶¶</span> <span>30</span>-32.  It stands to reason, therefore, t<span></span>hat </span></span></span>
</div>
<div>when an individual does <span>not </span>voluntarily share <span>a </span>PIN code with </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf23" data-page-no="23">
<div><div>
<div>32 </div>
<div>police, he is exhibiting a subjective expectation that his PIN code </div>
<div>will remain private <span>—</span> particularly when a phone<span>’s</span> PIN code i<span></span>s the </div>
<div>key to unlocking a wealth of private information. </div>
<div>¶ 58<span> </span><span>As for the second, objective prong, it is clear that society </span>
</div>
<div>recognizes as reasonable the expectation <span>that one’s </span>PIN code is </div>
<div>private.  Indeed, keeping a PIN code private is an indisputably </div>
<div>important part of how passwords function.  <span>See Booker</span><span>, </span>561 F. </div>
<div>Supp. 3d <span>at 931 (“T</span>here can be no question that a passcode ent<span></span>ered </div>
<div>into a cell phone, which is designed to keep the contents of t<span></span>he </div>
<div>phone hidden from others, is generally considered by <span></span>society to be </div>
<div>something private that should be free from warrantless intru<span></span>sion by </div>
<div>the government.<span>”); <span>see also </span></span>Jay E. Grenig, <span>Electronic Discovery a<span></span>nd </span>
</div>
<div>Records and Information Management Guide<span> § 3:7, Westlaw </span>
</div>
<div>(database updated Oct. 2023) <span>(“</span>It is essential to use passwor<span></span>ds and </div>
<div>to keep them safe. . . .  No one else should be told a passwor<span></span>d.<span>  </span>Any </div>
<div>compromised password should be changed immediately.<span>”);</span><span> Da<span></span>vis<span>, ¶ </span></span>
</div>
<div>30 (society would not deem a subjective expectation of pri<span></span>vacy to be </div>
<div>objectively reasonable <span>if</span> a defendant shared the PIN code with law </div>
<div>enforcement).   </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf24" data-page-no="24">
<div><div>
<div>33 </div>
<div>¶ 59<span> </span><span>The People <span>contend that d’Estree’s </span>PIN <span>code “</span>had no </span>
</div>
<div>meaningful existence other than to protect the contents of his </div>
<div>cellphone <span>—</span> it was just a series of numbers that provided no </div>
<div>independent information about his thoughts or life<span>.”  </span>This is true in </div>
<div>the most literal sense of what a PIN code is.  But this </div>
<div>characterization of a PIN code ignores the importance of what <span></span>a </div>
<div>phone’s <span>PIN code protects </span><span>—</span><span> namely, the wealth of private </span>
</div>
<div>information cell phones store.<span>  <span>See Riley</span></span>, 573 U.S. at 393-94, 40<span></span>1-</div>
<div>03<span>.<span> </span></span>
</div>
<div>¶ 60<span> <span>Because d’Estree has a cognizable right to<span> the privacy of his </span></span></span>
</div>
<div>cell phone PIN code that warrants constitutional protection <span></span>under </div>
<div>the subjective and objective prongs of the <span>Katz </span>test, we conclude <span>a </span>
</div>
<div>brute force attack to discover d’Estree’s <span>PIN code constitutes a </span>
</div>
<div>search under the Fourth Amendment.  The second warrant allowed </div>
<div>police to obtain “[p]asswords, encryption keys, codes, and/or ot<span></span>her </div>
<div>devices or information that may be necessary to access the de<span></span>vice </div>
<div>and its contents.”  <span>A brute force attack was therefore authorized.  </span>
</div>
<div>But the use of the PIN code discovered while executing the first,<span></span> </div>
<div>invalid warrant was not authorized<span>. </span> T<span>he district court’s “means” </span>
</div>
<div>rationale therefore cannot save the execution of the second w<span></span>arrant </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf25" data-page-no="25">
<div><div>
<div>34 </div>
<div>using the PIN code discovered while executing the first, unlawful </div>
<div>warrant.<span>  <span>See Riley<span>, 573 U.S. <span>at</span> 400</span></span>; </span><span>Dominguez-Castor</span><span>, ¶<span> <span>19.</span> </span></span>
</div>
<div>4.<span> <span>The Inevitable Discovery Rule </span></span>
</div>
<div>¶ 61<span> <span>“<span>Under the inevitable discovery rule, evidence initially </span></span></span>
</div>
<div>discovered in an unconstitutional manner may be received if <span></span>that </div>
<div>same evidence inevitably would have been obtained lawfully.<span>”</span><span>  </span>
</div>
<div>People v. Schoondermark<span>, 
759 P.2d 715
, 718 (Colo. 1988)<span>.  <span>“</span></span>The </span>
</div>
<div>ability to obtain a lawful search warrant after an illegal <span></span>search has </div>
<div>occurred does not satisfy the inevitable discovery excepti<span></span>on </div>
<div>requirements.<span>”</span><span>  <span>People v. Nelson<span>, 
2012 COA 37
, ¶ 52; </span>see also </span></span>
</div>
<div>People v. Diaz<span>, 
53 P.3d 1171
, 1176 (Colo. 2002)<span>.  </span> </span>
</div>
<div>The Government cannot later initiate a lawful </div>
<div>avenue of obtaining the evidence and then </div>
<div>claim that it should be admitted because its </div>
<div>discovery was inevitable. . . .  Because a valid </div>
<div>search warrant nearly always can be obtained </div>
<div>after the search has occurred, a contrary </div>
<div>holding would practically destroy the </div>
<div>requirement that a warrant for the search <span>. . .</span> </div>
<div>be obtained <span>before</span> the search takes place. </div>
<div>People v. Burola<span>, 
848 P.2d 958
, 963-64 (Colo. 1993) (quoting </span>Unit<span></span>ed </div>
<div>States v. Satterfield<span>, 
743 F.2d 827
, 846 (11th Cir. 1984))<span>.  </span>As a </span>
</div>
<div>result, <span>“</span>[t]he prosecution must affirmatively show that the lawf<span></span>ul </div>
<div>means of discovering this evidence was already initiated when the </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf26" data-page-no="26">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM9/Zgu/MM9ZguMTW/pwsU7Hj38Z0aT83wGmUtrM/47S7PRRijEBs%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=iPEvkU5OC5FPi4N1AiFHuUk9Opc%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>35 </div>
<div>evidence was obtained illegally.<span>”</span><span>  </span><span>People v. Dyer</span>, 
2019 COA 161
, </div>
<div>¶ <span>38.</span>
</div>
</div>
<div><div>10</div></div>
<div>
<div> </div>
<div>¶ 62<span> </span><span>As<span> with the independent source doctrine, this requirement </span></span>
</div>
<div>effectuates the policy underlying the inevitable discovery doctrine <span>—</span> </div>
<div>the exception should place the government in the <span>same</span> position (no </div>
<div>better, no worse) than it would have occupied if no illegality had </div>
<div>occurred.  <span>See Nix</span>, 467 U.S. <span>at</span> 443-44 (the independent sou<span></span>rce </div>
<div>doctrine<span>’</span><span>s </span><span>“</span><span>rationale is wholly consistent with and justifies our </span>
</div>
<div>adoption of the ultimate or inevitable discovery exception t<span></span>o the </div>
<div>exclusionary rule<span>”</span>).  Thus, if two searches <span>—</span> one lawful and one </div>
<div>unlawful <span>—</span> began at the same time and would procure the sam<span>e </span>
</div>
<div>evidence, suppressing the resulting evidence would place the </div>
<div>prosecution in a worse position because the police would have </div>
<div>inevitably obtained that evidence even if no misconduct had taken </div>
<div>place.  <span>Id<span>.</span></span> </div>
<div>¶ 63<span> </span><span>While it is true, as the district court noted, that the PIN code </span>
</div>
<div>would have eventually been discovered by police software <span>—</span> months </div>
<div> </div>
</div>
<div><div>10</div></div>
<div>
<div> Some courts, including the Tenth Circuit, do not require t<span></span>he </div>
<div>lawful means of discovering the evidence to have been initiated </div>
<div>before the unlawful search or seizure. <span> See, e.g.</span><span>, </span><span>United States v. </span>
</div>
<div>Christy<span>, 
739 F.3d 534
, 540-41 (10th Cir. 2014).  </span>
</div>
</div>
<a href="#pf26" data-dest-detail='[38,"XYZ",69,137,null]'><div style="border-style:none;position:absolute;left:133.489444px;bottom:835.986111px;width:15.660000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf27" data-page-no="27">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>36 </div>
<div>or years later <span>—</span> focusing on the word <span>“</span><span>inevitable<span>”</span></span> in such a mann<span></span>er </div>
<div>ignores the requirements of the rule and undermines its purpos<span></span>e, </div>
<div>and the exclusionary rule more broadly.</div>
</div>
<div><div>11</div></div>
<div>
<div>  While police here </div>
<div>initiated a <span>lawful</span> means to obtain the PIN code <span>—</span> via the brute </div>
<div>force attack that the second warrant authorized <span>—</span> that means was </div>
<div>abandoned in favor of a shortcut (using the illegally obtained PIN </div>
<div>code), thus violating a key requirement of the inevitable discov<span></span>ery </div>
<div>rule under Colorado precedent<span>.  </span><span>See Dyer</span>, ¶ 38<span>; </span><span>Nelson</span>, ¶ 52.<span>  </span>And </div>
<div>regardless, the soon-abandoned lawful means was initiated well </div>
<div>after the PIN code was first illegally obtained.  <span>See Dyer</span>, ¶ 38<span>.  </span>
</div>
<div>Simply because police software would have <span>eventually</span> discovered </div>
<div>the PIN code (perhaps years <span>after d’Estree’s trial date) </span>does not </div>
<div>render it admissible.<span>  </span> </div>
<div>¶ 64<span> </span><span>Even if we assume the second brute force attack would ha<span></span>ve </span>
</div>
<div>yielded a PIN code in three <span>or</span> so months (the time the first brute </div>
<div> </div>
</div>
<div><div>11</div></div>
<div>
<div> Merriam-Webster<span>’</span>s Dictionary defines <span>“</span><span>inevitable<span>”</span></span> as <span>“</span>incapa<span></span>ble of </div>
<div>being avoided or evaded.<span>”</span><span>  </span>Merriam-Webster Dictionary, </div>
<div>https://perma.cc/B3BN-X46N.  Black<span>’</span>s Law Dictionary defines </div>
<div>“<span>inevitable</span>”<span> within the context of the inevitable discovery <span></span>rule.  In </span>
</div>
<div>that definition, it notes that <span>“[t]</span>he inevitable discovery of evidence </div>
<div>by law enforcement is a discovery that would naturally and <span></span>lawfully </div>
<div>occur in the course of an investigation.<span>”</span><span>  </span><span>Black<span>’</span></span>s Law Dictionary </div>
<div>925 (12th ed. 2024)<span>.  </span> </div>
</div>
<a href="#pf27" data-dest-detail='[39,"XYZ",69,203,null]'><div style="border-style:none;position:absolute;left:439.376667px;bottom:794.011111px;width:15.670000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf28" data-page-no="28">
<div><div>
<div>37 </div>
<div>force attack took using the first, unlawful warrant), the information </div>
<div>would likely have come <span>after </span>the scheduled December 14, 202<span></span>1, </div>
<div>trial.  We are not prepared to speculate that the dist<span></span>rict court would </div>
<div>have granted a trial continuance whe<span>n </span>the prosecution waited so </div>
<div>close to the trial date to seek a second warrant. <span> See People v. Syrie</span><span>, </span>
</div>
<div>
101 P.3d 219
, 223 (Colo. 2004) (inevitable discovery<span></span> exception </div>
<div>cannot be met through <span>“</span>speculation about possible series of </div>
<div>events”). <span> Recall that police asked the court for the second warrant<span></span> </span>
</div>
<div>in October 2021 <span>—</span> almost five months after the May 12, 202<span></span>1, </div>
<div>suppression ruling <span>—</span> <span>knowing that d’Estree’s</span> trial was in Decem<span></span>ber </div>
<div>2021 and his speedy trial clock was ticking<span>.  </span> </div>
<div>¶ 65<span> </span><span>To admit evidence under the inevitable discovery doctrine </span>
</div>
<div>“<span>requires an affirmative showing of a reasonable probability <span></span>that the </span>
</div>
<div>evidence <span>would inevitably be discovered through law<span></span>ful means </span>
</div>
<div>already initiated when the seizure was made<span>.<span>”</span><span>  </span></span><span>I<span>d.</span></span><span> (emphasis </span>
</div>
<div>added)<span>; <span>see also Burola<span>, 848 P.2d <span>at</span> <span>963 (“</span></span></span></span>[I]<span>f <span>evidence is obtained </span></span>
</div>
<div>by illegal conduct, the illegality can be cured only if the poli<span></span>ce </div>
<div>possessed and were pursuing a lawful means of discovery <span></span>at the </div>
<div>time the illegality occurred.”)<span>.  A lawful means was initiated </span><span>—</span><span> the </span>
</div>
<div>brute force attack authorized by the second warrant <span>—</span> but that </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf29" data-page-no="29">
<div><div>
<div>38 </div>
<div>means was abandoned in favor of using the proverbial f<span></span>ruit of the </div>
<div>first, poisoned warrant <span>—</span> the known PIN code.   </div>
<div>¶ 66<span> </span><span>The primary rationale for the inevitable discovery rule as an </span>
</div>
<div>exception to the exclusionary rule would be undermined by allowing </div>
<div>admission of any evidence that would have been eventually </div>
<div>discovered, where <span>a </span>lawful means to obtain the evidence was </div>
<div>initiated but abandoned in favor of a tainted shortcut.  <span>See <span>Ni</span><span>x</span></span>, 467 </div>
<div>U.S. <span>at</span> <span>442</span><span>-<span>43</span></span><span>; </span><span>see</span><span> </span><span>also</span> <span>Casillas v. People</span>, 2018 <span></span>CO 78M, ¶¶ <span>21</span>-22, </div>
<div>36<span>.</span><span>  <span> </span></span>
</div>
<div>¶ 67<span> </span><span>We recognize that the exclusionary rule<span>’s deterrence rationale </span></span>
</div>
<div>is not served when the challenged evidence would <span>“</span>ultimately or </div>
<div>inevitably<span>”</span><span> be discovered by lawful means.  <span>Nix</span>, 467 U.S.<span></span> <span>at</span> <span>444</span> <span>(“</span>If </span>
</div>
<div>the prosecution can establish <span>. . .</span> that the information ultimately or </div>
<div>inevitably would have been discovered by lawful means . . . t<span></span>hen the </div>
<div>deterrence rationale has so little basis that the evidence should b<span></span>e </div>
<div>received<span>.”)</span><span>.  <span>As the <span>Nix </span>court reasoned, <span>“</span>when an officer is aware </span></span>
</div>
<div>that the evidence will inevitably be discovered, he will try t<span></span>o avoid </div>
<div>engaging in any questionable practice . . . [as] there will be little <span></span>to </div>
<div>gain from taking any dubious <span>‘</span><span>shortcuts<span>’</span></span> to obtain the evidence.<span>”</span><span>  </span>
</div>
<div>Id.<span> at 445-<span>46</span><span>; </span><span>see also People v. Briggs</span>, 
709 P.2d 911
, 923 (Colo. </span>
</div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2a" data-page-no="2a">
<div><div>
<div>39 </div>
<div>1985)<span>.  <span>But here, the opposite occurred </span></span><span>—</span><span> police took a shortcut, </span>
</div>
<div>presumably because they were not confident that the second <span></span>brute </div>
<div>force attack would crack the cell phone in time to put its </div>
<div>incriminating contents to use at the December 2021 t<span></span>rial.   </div>
<div>¶ 68<span> </span><span>To rule that use of the PIN code was permissible in this </span>
</div>
<div>context would provide an incentive for police to engage in such </div>
<div>shortcuts in the future.  <span>See Casillas</span>, ¶¶ 34-<span>36</span>.  Although there is a </div>
<div>reasonable probability that police software would have <span>eventua<span></span>lly<span> </span></span>
</div>
<div>produced d<span>’</span><span>Estree<span>’</span></span><span>s </span>PIN code<span>, </span>by Fink<span>’</span><span>s </span>own estimates and prior </div>
<div>brute force attack<span>, </span>we can only speculate whether this would have </div>
<div>occurred before the December 2021 trial<span>.  </span><span>See Syrie</span>, 101 P.3d at </div>
<div>223.<span>  <span> </span></span>
</div>
<div>D.<span> <span>Prejudice and Next Steps </span></span>
</div>
<div>¶ 69<span> </span><span>In their brief, the People <span>“</span>concede that if this Court wh<span></span>ere [sic] </span>
</div>
<div>to find that the trial court erred in denying all of <span>[d’E]stree’s</span> </div>
<div>preserved suppression claims, under the facts of this case, t<span></span>he </div>
<div>errors could not be harmless.<span>”</span><span>  </span>We agree.   </div>
<div>¶ 70<span> </span><span>The admission of the evidence gathered from d<span>’</span><span>Estree<span>’</span></span>s cell </span>
</div>
<div>phone undoubtedly prejudiced him at trial.  Photos of d<span>’</span>Estree </div>
<div>holding a handgun that matched the description of the homicide </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2b" data-page-no="2b">
<div><div>
<div>40 </div>
<div>weapon, text messages admitting that he expected to go to prison<span>, </span>
</div>
<div>and the incriminating internet search history were impactful pieces </div>
<div>of evidence against d<span>’</span>Estree.  Further, the prosecut<span>or</span> referred t<span></span>o </div>
<div>this evidence several times in closing argument, pointing <span>to</span> <span>it</span> to </div>
<div>help convince the jurors that, regardless of what they thought of </div>
<div>Lucero<span>’</span><span>s <span>credibility, they could rely on the evidence taken f<span></span>rom </span></span>
</div>
<div>d’Estree’s <span>cell phone <span>to</span> corroborate her testimony<span>.  </span>And the </span>
</div>
<div>prosecution noted in its motion for reconsideration after the first </div>
<div>warrant<span>’</span><span>s suppression that it considered the <span>“</span>evidence collected </span>
</div>
<div>from the cell phone belonging to the defendant [to be] <span>of</span> critical </div>
<div>importance to the prosecution of this case.<span>”</span><span>  </span><span> </span>
</div>
<div>¶ 71<span> </span><span>We cannot find that the improper admission of this critical </span>
</div>
<div>evidence against d<span>’</span>Estree was harmless beyond a reasonable do<span></span>ubt<span>.  </span>
</div>
<div>Furthermore, these errors likely impacted every one of his </div>
<div>convictions<span>. <span> The </span></span><span>prosecution’s</span><span> trial evidence supporting each of </span>
</div>
<div>d<span>’</span><span>Estree<span>’</span><span>s convictions, especially Lucero</span><span>’</span><span>s testimony, benefite<span></span>d from </span></span>
</div>
<div>this improperly admitted digital evidence for corroborati<span>on</span>.  Th<span></span>us, </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2c" data-page-no="2c">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>41 </div>
<div>these errors require reversal of each of his convictions.</div>
</div>
<div><div>12</div></div>
<div>
<div>  <span>See </span>
</div>
<div>Hagos<span>, ¶ 11;<span> see also People v. Folsom</span>, 
2017 COA 146M
, ¶¶ <span>17</span>-23 </span>
</div>
<div>(admission of videos extracted from iPod was not harmless an<span></span>d </div>
<div>required reversal).   </div>
<div>¶ 72<span> </span><span>In the light most favorable to the prosecution, however, </span>
</div>
<div>considering both the properly admitted evidence through witness </div>
<div>testimony and the police’s <span>investigation, in addition to the </span>
</div>
<div>improperly admitted cell phone evidence, we cannot say w<span></span>ith </div>
<div>certainty that there was insufficient evidence to convict <span></span>d’Estree of </div>
<div>some or all of the charged crimes.  And because this reversal is </div>
<div>predicated on the receipt of improperly admitted evidence, <span></span>the </div>
<div>prosecution is entitled to a retrial of all of d’Estree’s charge<span></span>s on </div>
<div>remand.  <span>See People v. Marciano</span>, 
2014 COA 92M
-2, ¶¶ 42-<span>49</span><span>; <span>see </span></span>
</div>
<div>also People v. Sisneros<span>, 
606 P.2d 1317
, 1319 (Colo. App. <span></span>1980)<span> </span></span>
</div>
<div>(“[W]<span>here reversal is predicated upon trial error consisting of t<span></span>he </span>
</div>
<div>reception of inadmissible evidence, remand for a new trial <span></span>is proper, </div>
<div> </div>
</div>
<div><div>12</div></div>
<div>
<div> The People do not address whether any of d<span>’</span><span>Estree<span>’</span></span>s convictions </div>
<div>may have been <span>un</span>affected by the admission of the digital evidence </div>
<div>were we to find the execution of the second warrant was infirm, </div>
<div>while d<span>’</span>Estree contends that every one of his convictions mu<span></span>st be </div>
<div>reversed<span>.  <span> </span></span>
</div>
</div>
<a href="#pf2c" data-dest-detail='[44,"XYZ",69,154,null]'><div style="border-style:none;position:absolute;left:567.448333px;bottom:877.986667px;width:15.660000px;height:32.880000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2d" data-page-no="2d">
<div><div>
<div>42 </div>
<div>and an appellate court should not review the remain<span></span>ing evidence in </div>
<div>order to determine whether it is sufficient to sustain <span></span>the </div>
<div>conviction<span>.”) (citations omitted). <span> </span></span>
</div>
<div>III.<span> <span>Disposition </span></span>
</div>
<div>¶ 73<span> </span><span>We reverse d<span>’</span><span>Estree<span>’</span></span>s convictions and remand the case to the </span>
</div>
<div>district court for a new trial.   </div>
<div>JUDGE SULLIVAN concurs<span>.  </span> </div>
<div>JUDGE GROVE specially concurs. </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2e" data-page-no="2e">
<div><div>
<div>43 </div>
<div>JUDGE GROVE, specially concurring<span>.   </span> </div>
<div>¶ 74<span> <span>I agree with the majority’s reasoning and its conclusion that </span></span>
</div>
<div>d’Estree’s convictions must be reversed.  I write separately<span></span> to urge </div>
<div>the Colorado Supreme Court to revisit two aspects of<span></span> its inevitable </div>
<div>discovery jurisprudence that I believe have drifted away from the </div>
<div>United States Supreme Court’s articulation of the rule.<span> </span>
</div>
<div>¶ 75<span> </span><span>First, since the doctrine was first applied in this state, </span>
</div>
<div>Colorado’s version of the inevitable discovery rule has requi<span></span>red the </div>
<div>prosecution to show that (1) “the police were pursuing<span></span> an </div>
<div>independent investigation at the time the illegality occurred,” and </div>
<div>(2<span>) there was “<span>a reasonable probability<span> that the evidence would have </span></span></span>
</div>
<div>been discovered in the absence of police misconduct.<span>” </span> <span>People v. </span>
</div>
<div>Breidenbach<span>, 
875 P.2d 879
, 889 (Colo. 1994) (emphasis a<span></span>dded).  My </span>
</div>
<div>concern in this case is with the second element of this test, which </div>
<div>not only makes little semantic sense but also materially diverge<span></span>s </div>
<div>from the standard set forth in <span>Nix v. Williams</span>, 467 U.S. <span></span>431 (1984).   </div>
<div>¶ 76<span> <span>Breidenbach<span>’s “reasonable probability” approach tracked t<span></span>he </span></span></span>
</div>
<div>Fifth Circuit Court of Appeals’ holding in <span>United Stat<span></span>es v. Cherry<span>, </span></span>
</div>
<div>
759 F.2d 1196
 (5th Cir. 1985), which applied pre-existing circuit </div>
<div>precedent to define the scope of the inevitable discovery rule base<span></span>d </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf2f" data-page-no="2f">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MMX/n%2Be/MMXn%2BekQ817y/lXyeovZwcgeMWibwHo7dUSO3Lu0a7r74%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=IN1%2FJthdKqjDODiP4FUaHzin3eA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>44 </div>
<div>on its conclusion that the <span>Nix <span>court had made “no attempt</span></span> . . .<span></span> to </div>
<div>define the contours of that exception.”  <span>Id. <span>at 1204.  But howeve<span></span>r </span></span>
</div>
<div>thin the analysis in <span>Nix </span>may have been, it still clearly held that<span></span> the </div>
<div>inevitable discovery rule only applies if the prosecution </div>
<div>“establish[es] <span>by a preponderance of the evidence<span> that the </span></span>
</div>
<div>information ultimately or inevitably would have been discovere<span></span>d by </div>
<div>lawful means.”  <span>Nix</span><span>, 467 U.S.<span> </span>at 444 (emphasis added).</span>
</div>
</div>
<div><div>1</div></div>
<div>
<div>  <span>The </span>
</div>
<div>preponderance standard is different from “reasonable pro<span></span>bability,” </div>
<div>and, importantly for this case, it also places a heavier burd<span></span>en on </div>
<div>the prosecution.  <span>See United States v. Zava<span></span>la<span>, 
541 F.3d 562
, 579 n.7 </span></span>
</div>
<div>(5th Cir. 2008) (acknowledging that the Fifth Circuit’s applicati<span></span>on of </div>
<div>the “reasonable probability” test rather than a preponderance </div>
<div>standard in the context of the inevitable discovery rule “is mo<span></span>re </div>
<div>favorable to the Government than <span>the test in other circuits”); <span>cf. Mi<span></span>le </span></span>
</div>
<div>High Cab, Inc. v. Colo. Pub. Utils. Comm’n<span>, 
2013 CO 26
, ¶ 15 </span>
</div>
<div> </div>
</div>
<div><div>1</div></div>
<div>
<div> I recognize the linguistic difficulties in measuring inevitability in </div>
<div>terms of probability.  <span>See, e.g.</span><span>,</span><span> United States v. Cabassa</span>, 62 F.3d </div>
<div>470, 474 (2d Cir. 1995) (recognizing the “semantic puzzle” c<span></span>reated </div>
<div>by <span>“using the preponderance of the evidence standard</span> to prove </div>
<div>inevitability”).  But that standard is dictated by the holding in <span>Nix v. </span>
</div>
<div>Williams<span>, 
467 U.S. 431
 (1984), and has generally pro<span></span>ved workable </span>
</div>
<div>in the context of suppression rulings. </div>
</div>
<a href="#pf2f" data-dest-detail='[47,"XYZ",69,187,null]'><div style="border-style:none;position:absolute;left:570.655556px;bottom:625.932222px;width:10.080000px;height:32.880000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf30" data-page-no="30">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM9/Zgu/MM9ZguMTW/pwsU7Hj38Z0aT83wGmUtrM/47S7PRRijEBs%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=iPEvkU5OC5FPi4N1AiFHuUk9Opc%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>45 </div>
<div>(observing that “reasonable probability” is used “to refer to a </div>
<div>likelihood of occurrence which, although not insignificant<span></span>, </div>
<div>nevertheless need not rise to the level of a preponderance of <span></span>the </div>
<div>evidence”); <span>Krutsinger v. People<span>, 
219 P.3d 1054
, 1060 <span></span>(Colo. 2009) </span></span>
</div>
<div>(“[T]he Supreme Court has made abundantly clear that<span></span> it does not </div>
<div>intend its use of the term ‘reasonable probability’ to req<span></span>uire a </div>
<div>showing that the defendant would more likely than not have </div>
<div>received a different result <span>. . . </span><span>.”).  As a result, Colorado’s ve</span>rsion of </div>
<div>the inevitable discovery rule appears to be out of step wit<span></span>h Supreme </div>
<div>Court precedent.</div>
</div>
<div><div>2</div></div>
<div>
<div>  </div>
<div>¶ 77<span> </span><span>To be sure, in practice it will often make no difference whet<span></span>her </span>
</div>
<div>the “reasonable probability” or preponderance standard ap<span></span>plies.  </div>
<div> </div>
</div>
<div><div>2</div></div>
<div>
<div> Notably, <span>the Colorado Supreme Court’s application of<span></span> the </span>
</div>
<div>“reasonable probability” test in inevitable discovery cases also </div>
<div>diverges from its application of a preponderance standa<span></span>rd in the </div>
<div>closely related context of the independent source doctrine.  <span>See </span>
</div>
<div>Peo<span>ple v. Thompson<span>, 
2021 CO 15
, ¶ <span>22 (“When, as here, the People </span></span></span>
</div>
<div>assert the applicability of the independent source doctrine, they </div>
<div>bear the burden of proving by a preponderance of the <span></span>evidence the </div>
<div>doctrine<span>’s applicability.”).<span>  <span>Because the two exceptions share the </span></span></span>
</div>
<div>same doctrinal underpinnings, <span>see Murray v. United States</span>, 487 </div>
<div>U.S. 533, 539 (1988) (observing that <span>“</span>[t]he inevitable discovery </div>
<div>doctrine <span>. . . </span>is in reality an extrapolation from the independent </div>
<div>source doctrine<span>”), </span>I see no reason why the same standard sh<span></span>ould </div>
<div>not apply to both.  </div>
</div>
<a href="#pf30" data-dest-detail='[48,"XYZ",69,285,null]'><div style="border-style:none;position:absolute;left:236.529444px;bottom:500.007222px;width:10.080000px;height:32.870000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf31" data-page-no="31">
<div><div>
<div>46 </div>
<div>But in close cases, the test that the trial court applies may well <span></span>be </div>
<div>dispositive.  This case provides a perfect example.  Given that<span></span> the </div>
<div>United States Secret Service took three months to complete a <span></span>brute </div>
<div>force attack on the phone’s PIN code, I believe tha<span>t it was </span>
</div>
<div>reasonably probable that a second brute force attack woul<span></span>d also be </div>
<div>successful within a similar amount of time.  But I am far less </div>
<div>certain that the prosecution <span>proved</span> <span>by a preponderance o<span></span>f the </span>
</div>
<div>evidence<span> that cracking the PIN code would be inevitable in any sort </span>
</div>
<div>of reasonable timeframe.  <span>See United States v. Jones</span>, 
72 F.3d 1324
, </div>
<div>1334 (7th Cir. 1995) (“Inevitable discovery is not an excepti<span></span>on to be </div>
<div>invoked casually, and if it is to be prevented from swallowing <span></span>the </div>
<div>Fourth Amendment and the exclusionary rule, courts must tak<span></span>e </div>
<div>care to hold the government to its burden <span>of proof.”).  To t<span></span>he </span>
</div>
<div>contrary, the only evidence on this point was Agent Fink’s </div>
<div>testimony that, if she had not decided to use the illegally <span></span>obtained </div>
<div>PIN code after only a week of searching, the brute force attack c<span></span>ould </div>
<div>have taken “anywhere from a week to 11 years” to unlock t<span></span>he </div>
<div>phone.  Fink offered few other details about how quickly the process </div>
<div>was likely to proceed or how the software worked.  Inf<span></span>ormation of </div>
<div>that sort would have helped the court better assess how the search </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf32" data-page-no="32">
<div><div>
<div>47 </div>
<div>would turn out.  For example, if the court had been presented wi<span></span>th </div>
<div>evidence that the software attempts easy-<span>to</span>-remember PIN codes </div>
<div>(like the one here) first, before moving on to more random numbe<span></span>rs, </div>
<div>it might have been able to better forecast the likelihood that </div>
<div>execution of the second warrant would have been succes<span></span>sful in the </div>
<div>time remaining before trial.   </div>
<div>¶ 78<span> </span><span>I acknowledge that the prosecution could have sought up to <span></span>a </span>
</div>
<div>six-month continuance of the trial date if it had tried and failed to </div>
<div>discover the PIN code.  <span>See </span>§ 18-1-405(6)(g)(I), C.R.S. 2024.  But <span></span>in </div>
<div>light of Fink’s testimony, it appears that an extension of t<span></span>hat length </div>
<div>would have offered little additional certainty and mig<span></span>ht, depending </div>
<div>on the overall age of the case, have begun to raise constit<span></span>utional </div>
<div>speedy trial concerns.  <span>See People v. Nelson</span>, 
2014 COA 165
, ¶¶ <span>21<span></span><span>-</span></span>
</div>
<div>25.  Accordingly, if the district court had been required to hol<span></span>d the </div>
<div>prosecution to the burden of proof dictated by <span>Nix</span>, it might well </div>
<div>have granted d’Estree’s motion to suppress.<span> </span>
</div>
<div>¶ 79<span> </span><span>Second, in my view, parties and trial courts in Colorado wo<span></span>uld </span>
</div>
<div>be well served by an approach to the inevitable discovery doctrine </div>
<div>that explicitly takes deterrence into account.  I do not mean t<span></span>o </div>
<div>suggest that the prosecution should be required to show an </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf33" data-page-no="33">
<div><div>
<div>48 </div>
<div>absence of bad faith (indeed, <span>Nix</span> rejected that very argument,<span></span> 467 </div>
<div>U.S. at 445), but as Justice Stevens pointed out in his <span>Nix </span>
</div>
<div>concurrence, the inevitable discovery doctrine would “be </div>
<div>inconsistent with the deterrent purposes of the exclusionary <span></span>rule” if </div>
<div>it provided law enforcement with an incentive to commit </div>
<div>constitutional violations “by permitting the prosecution t<span></span>o avoid the </div>
<div>unc<span>ertainties inherent in its search for evidence.”  <span>Id.</span><span> at 456 </span></span>
</div>
<div>(Stevens, J., concurring in the judgment).  Consistent wit<span></span>h this </div>
<div>understanding, some federal circuits have made clear t<span></span>hat the </div>
<div>inevitable discovery exception should not apply under </div>
<div>circumstances that would undermine the fundamental purpose of </div>
<div>the exclusionary rule.  <span>See, e.g.</span><span>,</span><span> United States v. Crespo-Rios</span>, <span></span>645 </div>
<div>F.3d 37, 42 (1st Cir. 2011) (holding that inevitable discovery sh<span></span>ould </div>
<div>apply only where <span>“</span>application of the doctrine in a particular c<span></span>ase </div>
<div>will not sully the prophylaxis of the Fourth Amendment”<span> (quoting </span>
</div>
<div>United States v. Hughes<span>, 
640 F.3d 428
, 440 (1st Cir. 2011))); </span>Unit<span></span>ed </div>
<div>States v. Vasquez De Reyes<span>, 
149 F.3d 192
, 195 (3d Cir. 1<span></span>998) </span>
</div>
<div>(holding that the inevitable discovery rule “permits the co<span></span>urt <span>to </span>
</div>
<div>balance the public interest in providing a jury with all relevant<span></span> and </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf34" data-page-no="34">
<div>
<img alt="" src="https://icbg.s3.amazonaws.com/media/MM9/Zgu/MM9ZguMTW/pwsU7Hj38Z0aT83wGmUtrM/47S7PRRijEBs%3D?AWSAccessKeyId=ASIA5PHC3MTPS6UWKBZO&amp;Expires=1728536566&amp;Signature=iPEvkU5OC5FPi4N1AiFHuUk9Opc%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBQaCXVzLWVhc3QtMSJGMEQCIFtfD2Ez3JMDb4MbnsKue0sSlWceRGAVSolTbgmrm9VJAiA3JPi4P6S9extweDDPns%2Bd5h%2FYlzrI5Hw5Lx32j2zGGCqyBQhtEAAaDDkyNjA0MTIwMzkzNSIM4TgBc5ht0DC2AJY%2FKo8F7qSALm9PItWg%2BCzJYMsqcR%2BY63pXgo6JCCEGS1plO0dn3TawAeo5fsJJAP9e6YZerRshoIe27gzpWWY53NzdxGt6ZO3l%2FuM4TEYyP935rQdKgnR03XSk9vuaQ45OGVgNCUAyJ38AX8FNnhn0LJXaZjnSmleqm27mI%2BEs%2FKkfXA8KEjZmpUejdDqf7Ya108h6%2BwNsPDDBuNNM3Ht3sbOd11BYlx1lLWV4a8H7u94Bow68BMB8VIiC7mwbPxnS0fBg9w71z09vGd7JQElHJuBcKc9GwdOF0KPZ8Gs%2BpIL4glv7ikLuzynlkUR5VRT3DezH3dlyLz%2Bgh%2BN5S7KKQEF63TwbeLiggOzlQJPc0oQpVWgtY8pZ0u5o7XmTOJQ%2BNGIw1DvRh7NUKgBuBwfZQZDkVRJ1Wfm4PawOjOBGet1w82qp0b%2BLa2NuqCjLW7%2Fyl%2FadKPfdARcP8ltQXsk4LDt59oZBYulpcwcm3egPXLCJIrPtNyvXm0lUB8QsYqbSEXiG2NybT0l%2FD%2FUj9S0aCWGFbgAi0jVa4JUI36uRpKfl%2ByF%2F1c6Op19SBu3RtFJeiedbMYn85UYYm5cfOobB4gmL8Q33m%2FgClUBeY%2BXaK7prVtXr8nKceJz8Wsi%2B0vzEyGlTrKkGE3Ec%2F9I%2FCsvSRZCvhk7KZE7Q9iqdQ19gPXDwS3%2FM7RqKlEe0I9U3DJUdP3r7LmfExhdTzHQ7EwtScIoDy7PtWYWQhxT7OZcrOYuTUukm8AtlRBPL2McaEFfbk50WeNjYi%2FtMl8ukSvrZzaGtzmXEeOLWsRH6aWk8jcnutFMP%2BnM2l2Ff%2FOFPj4CnUxfi5dKriCupfngdNmm1jxhz6Ek5xZ0F3xY5TmHZ9%2BxFazCMnJ24BjqyAdBrXXeffGhNbbjae78%2BtzJVgxPmy8XeQL3C8jx3eNyZJ7cnKKMib%2BC3qodL9uDu%2F5F21Qgn8gwklrISpeRjnm3th7sIc6FGJGEQ%2BJuJr90anXl2WRB1z2p0QYa342p%2B6VBvG%2ByGf7FJ356zmyz8aLCNduYJCzja8a5QuZ6iarOCgSbX3YtbGUDvUjJR0bY8g2V%2B67gGtpTb%2BUjYAIquI1CllkC5nEi6LbN4PyAL326%2BSFE%3D"><div>
<div>49 </div>
<div>probative evidence in a criminal proceeding against society’s </div>
<div>interest in deterring unlawful police conduct”).</div>
</div>
<div><div>3</div></div>
<div>
<div>  </div>
<div>¶ 80<span> <span>As the majority’s analysis makes clear, the circumstances </span></span>
</div>
<div>before us here seem to be exactly what those cases had in mind. <span></span> </div>
<div>With trial fast approaching, and apparently facing a very real </div>
<div>possibility that the clock would run out before the prosecuti<span></span>on </div>
<div>could <span>collect the important evidence saved in d’Estree’s cell <span></span>phone, </span>
</div>
<div>Agent Fink took a shortcut and made a conscious decision <span></span>to open </div>
<div>the phone using the PIN code that she knew full well had been </div>
<div> </div>
</div>
<div><div>3</div></div>
<div>
<div> Notably, several states have rejected the reasoning of <span>Nix </span>
</div>
<div>altogether and held as a matter of state constitutional law t<span></span>hat the </div>
<div>prosecution must demonstrate the absence of bad faith <span></span>for the </div>
<div>inevitable discovery rule to apply.  <span>See Garnett v. State</span>, 308 A.3d </div>
<div>625, 648 <span>(Del. 2023) (“[O]</span>ur holding that the inevitable-discovery </div>
<div>exception is compatible with Article I, § 6 [of the Delaware </div>
<div>Constitution] assumes that it will be applied only when it<span></span> is clear </div>
<div>that <span>‘</span>the police have not acted in bad faith to accelerate t<span></span>he </div>
<div>discovery of the evidence in question.<span>’”</span>) (citation omitted); <span>Stat<span></span>e v. </span>
</div>
<div>Holly<span>, 
2013 ND 94
, ¶ <span>55<span>, </span></span>
833 N.W.2d 15
, 33 <span>(“</span>When a shortcut is </span>
</div>
<div>taken that circumvents the requirements of the Fourth Amen<span></span>dment, </div>
<div>the requirements of the inevitable-discovery doctrine have not b<span></span>een </div>
<div>met<span>.”); <span>Smith v. State<span>, 
948 P.2d 473
, 481 (Alaska 1997) (recognizing </span></span></span>
</div>
<div>the inevitable discovery rule but limiting its application under the </div>
<div>Alaska Constitution <span>“where the police have intentionally or </span>
</div>
<div>knowingly violated a suspect<span>’s rights”</span>); <span>Commonwealth v. Sbordone</span>, </div>
<div>
678 N.E.2d 1184
, 1190 (Mass. 1997) (The inevitable discovery rule </div>
<div>may apply “<span>as long as the officers did not act in bad faith <span></span>to </span>
</div>
<div>accelerate the discovery of evidence, and the particular </div>
<div>constitutional violation is not so severe as to require <span></span>suppression.<span>”). </span> </div>
</div>
<a href="#pf34" data-dest-detail='[52,"XYZ",69,400,null]'><div style="border-style:none;position:absolute;left:496.608333px;bottom:836.011667px;width:10.080000px;height:32.860000px;background-color:rgba(255,255,255,0.000001);"></div></a>
</div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
<div id="pf35" data-page-no="35">
<div><div>
<div>50 </div>
<div>illegally obtained.  If ever there was a time that called for an a<span></span>dverse </div>
<div>consequence, this was it.  Otherwise, we would be sanctioning </div>
<div>precisely the type of unlawful police conduct that the exclusi<span></span>onary </div>
<div>rule was intended to discourage.  </div>
</div></div>
<div data-data='{"ctm":[1.277778,0.000000,0.000000,1.277778,0.000000,0.000000]}'></div>
</div>
</div></div></div></div>

Case Details

Case Name: People v. d'Estree
Court Name: Colorado Court of Appeals
Date Published: Oct 3, 2024
Citation: 2024 COA 106
Docket Number: 22CA0237
Court Abbreviation: Colo. Ct. App.
Read the detailed case summary
AI-generated responses must be verified and are not legal advice.
Your Notebook is empty. To add cases, bookmark them from your search, or select Add Cases to extract citations from a PDF or a block of text.