From Casetext: Smarter Legal Research

State v. Diaw

Court of Appeals of Ohio, Tenth District
Jun 11, 2024
2024 Ohio 2237 (Ohio Ct. App. 2024)

Opinion

22AP-614

06-11-2024

State of Ohio, Plaintiff-Appellant, v. Mamadou Diaw, Defendant-Appellee.

G. Gary Tyack, Prosecuting Attorney, and Seth L. Gilbert for appellant. Adam G. Burke for appellee. Seth L. Gilbert. Adam G. Burke.


APPEAL from the Franklin County Court of Common Pleas, C.P.C. No. 21CR-0379

On brief:

G. Gary Tyack, Prosecuting Attorney, and Seth L. Gilbert for appellant.

Adam G. Burke for appellee.

Argued:

Seth L. Gilbert.

Adam G. Burke.

DECISION

MENTEL, P.J.

{¶ 1} Plaintiff-appellant, State of Ohio, appeals from an October 3, 2022 decision and entry granting the motion to suppress of defendant-appellee, Mamadou Diaw. For the reasons that follow, we reverse.

I. FACTS AND PROCEDURAL HISTORY

{¶ 2} On January 28, 2021, Mr. Diaw was indicted by a Franklin County grand jury on one count of aggravated robbery, in violation of R.C. 2911.01, a felony of the first degree (Count One); one count of robbery in violation of R.C. 2911.02, a felony of the second degree (Count Two); and one count of robbery in violation of R.C. 2911.02, a felony of the third degree (Count Three). All three counts included a three-year firearm specification in violation of R.C. 2941.145(A). Mr. Diaw entered a plea of not guilty on February 2, 2021.

{¶ 3} On June 14, 2021, Mr. Diaw filed a combined motion to dismiss the January 28, 2021 indictment or, alternatively, motion to suppress evidence resulting from the illegal search of Mr. Diaw's "GPS/location date, digital data, and account information." (June 14, 2021 Mot. to Suppress at 1.) In the filing, Mr. Diaw argued that law enforcement's use of various R.C. 2935.23 investigative subpoenas, rather than search warrants, violated his constitutional rights as he had a reasonable expectation of privacy over the online information. Mr. Diaw also alleged that the subpoenas at issue were overly broad in their terms to be regarded as reasonable. On June 28, 2021, the state filed a memorandum in opposition arguing that R.C. 2935.23 authorized law enforcement to gather information through both witness testimony and other sources of information such as data and documents. The state posited that the investigative subpoenas were reasonably tailored in scope, and Mr. Diaw had no genuine privacy interests in the online accounts and information contained therein. After a series of continuances, this matter was set for an evidentiary hearing on February 24, 2022. The following evidence was adduced at the hearing.

{¶ 4} Detective Michael Sturgill testified that he has worked at the Groveport Police Department for approximately 24 years. (Feb. 24, 2022 Tr. at 9.) In February 2020, Sturgill became involved in the investigation of an aggravated robbery case that occurred at a Kroger parking lot located on Groveport Road. (Tr. at 12.) According to Sturgill, the victim in this case, K.W., had arranged for the purchase of a MacBook laptop at the parking lot through the company, Letgo. Sturgill described Letgo as "similar to Craigslist * * * you can take your property and sell it on there." (Tr. at 12.) Upon arrival at the parking lot, K.W. met with two individuals, one later identified as Mr. Diaw, regarding the purchase of the laptop. (Tr. at 13.) According to the grand jury summary, "Mr. Diaw and the accomplice took an i[P]hone and $360.00 cash from the victim for the sale / trade of the computer but Mr. Diaw then pulled the computer away from the victim and began punching the victim in his head and face." (Def. Ex. 2 at 1.) The individuals then fled the scene.

{¶ 5} Sturgill testified that K.W. was able to provide law enforcement (1) descriptions of the individuals involved in the robbery, (2) a description of the vehicle-a red Honda Accord with tinted windows-, (3) account information from the Letgo website, which included the username "John Malick" and the original posting for the computer, (4) the last four digits of the vehicle's license plate; and (5) the telephone number that the individual used to communicate with the victim. (Tr. at 13-14.) Sturgill attempted to search the Ohio Law Enforcement Gateway ("OHLEG") system using the description of the vehicle and the partial license plate number but was unsuccessful. (Tr. at 16.) Sturgill then conducted a Google search of the telephone number provided by the victim. The search revealed that the cellphone carrier was Boost Mobile, which, according to Sturgill, used Sprint cellphone towers. (Tr. at 17.)

{¶ 6} During the course of the investigation, Sturgill issued several investigative subpoenas to various digital account providers. On February 19, 2020, Sturgill requested an investigative subpoena to Letgo through the Franklin County Municipal Court. The subpoena represented that R.C. 2934.23 authorized the Franklin County Municipal Court to issue subpoenas in aid of felony investigations. The subpoena also identified the felony investigation at issue, aggravated robbery/20-000339, and ordered the Letgo representative "to appear before this Court at the time, date, and location set forth" to offer the following information:

Please provide any and all records including all names, addresses, phone numbers, I.P. addresses and email addresses associated with the customer using the name of John Malick (possibly utilizing the phone number of 720-203-7022) and posting for sale a Mackbook Pro 2017 13 inch lap top computer for sale through Letgo posted in Columbus Ohio between the dates of 02-16-2020 through 02-18-2020.
(Sic passim.) (State's Ex. A-1.)

{¶ 7} The subpoena directed that "[Letgo] can comply with this Investigative Subpoena without the court appearance scheduled below by providing the requested information to the law enforcement officer who requested this subpoena, and whose contact information is set forth below, prior to the date scheduled for the appearance." (State's Ex. A-1.)

{¶ 8} In response to the investigative subpoena, Letgo provided an IP address, an email address associated with the posting, and a single latitude and longitude. (Tr. at 18, 21-25.) Sturgill described the longitude and latitude data point as a "GPS [coordinate] that will take you to a place." (Tr. at 25.) According to Sturgill, the coordinate corresponded with a McDonald's located on East Broad Street. (Tr. at 25.) During the course of the investigation, Sturgill determined that that the suspect's apartment was located directly behind the McDonald's. (Tr. at 26, 28.)

{¶ 9} Sturgill next sent a subpoena to Sprint, which responded by providing the name on the account, "John Malick," and an address located in Colorado. (State's Ex. A-2; Tr. at 28.) According to Sturgill, based on the information, he determined the name and address were likely fake. (Tr. at 19, 28-29.) Sturgill also testified that the subpoena issued to Boost Mobile, identified as State's Exhibit A-5, produced no results. (Tr. at 29-31.)

{¶ 10} Based on the email address provided by Letgo, Sturgill issued an investigative subpoena to Google to acquire any and all identifying information and records associated with the email address. (State's Ex. A-3; Tr. at 31.) In response to the subpoena, Google identified the name associated with the account as Mamadou Diaw. (Tr. at 31.) Sturgill searched Mr. Diaw's name in OHLEG and procured a driver's license photograph, which he observed matched the victim's description of one of the individuals involved in the robbery. Sturgill created a photo array with Mr. Diaw's photograph, and a blind administrator presented the array to K.W. who identified Mr. Diaw. (Tr. at 32-33.) Sturgill also obtained Mr. Diaw's driver's license information through OHLEG. According to Sturgill, a Honda Accord was registered to Mr. Diaw. (Tr. at 39-40.)

{¶ 11} During the course of the investigation, the victim contacted Sturgill and notified him that the same individual identified as "John Malick" was posting on another website, OfferUp. (Tr. at 34.) Sturgill issued a subpoena to OfferUp, which resulted in an additional Gmail address and IP address. (State's Ex. A-6; Tr. at 36-37.) Sturgill also sent a subpoena to Charter Communications, Inc. ("Charter") who serviced the IP addresses provided by Letgo and OfferUp. (State's Ex. A-4; Tr. at 34-35, 39.) Charter provided another Gmail address, phone number, and subscriber name that was associated with an address on Cedar Drive. (Tr. at 38-39.) Upon investigating the Cedar Drive address, Sturgill observed a Honda Accord parked at the residence that matched the description and partial license plate number provided by the victim. (Tr. at 39.)

A second subpoena was issued to Charter, marked State's Exhibit A-7, but it did not yield any relevant results. (Tr. at 41.)

{¶ 12} Sturgill testified that he did not specifically ask for location data in any of the investigative subpoenas. (Tr. at 41.) Sturgill, however, did acknowledge that he sent a search warrant to Sprint, marked as State's Exhibit A-8, seeking "GPS location data, IP address information, cell tower location, customers connected to, including the direction of cell towers were facing." (Tr. at 42.) While Sprint did not respond to the search warrant, Sturgill testified, "I wasn't too concerned with the records once I found him because I found him, his car at Cedar Drive. Once I found that, I didn't really care about this." (Tr. at 43-44.) Sturgill went on to state that the subpoenas were not intended to "track anyone's particular movements," "the only time [he] tried that was with * * * a Sprint search warrant, and I didn't get the records." (Tr. at 46.)

{¶ 13} On cross-examination, Sturgill acknowledged that the results from the Letgo subpoena led to the Google subpoena, which led him to obtaining Mr. Diaw's name. (Tr. at 49.) As a result of procuring Mr. Diaw's name, Sturgill was able to run his information in OHLEG to match the vehicle and partial license plate. (Tr. at 49-50.) According to Sturgill, the OfferUp and Charter subpoenas were "essentially a dead end." (Tr. at 51.) Sturgill conceded that the subpoena to Letgo included the language "any and all records" because he did not want to limit the records Letgo could produce in response to the subpoena. (Tr. at 53-54.) "[I]f I don't put any a[nd] all, they'll only give me -- they'll only give me just what I specifically spell out. So if -- any information they give me, absolutely, I'll take it." (Tr. at 53-54.) Sturgill conceded that he used the coordinate in the investigation and, in fact, cited it in the police summary. (Tr. at 55.) Sturgill testified that he was able to connect the longitude and latitude data point with the residence where he located Mr. Diaw. (Tr. at 55, 65, 68.)

{¶ 14} On redirect, Sturgill testified that the single coordinate, in his opinion, "would track [the] last time [Mr. Diaw] logged into Letgo, and it would have hit his location he was at from there at the time he logged into that site." (Tr. at 75.) While Sturgill initially did not get any information from the partial license plate, he later learned that he could modify the search to input the license plate and car information to reach a result. (Tr. at 77.) Sturgill testified that if he had searched "a Honda 4S, meaning four doors, and then the partial tag * * * it leads you right to him just the same way. There's a list of, you know, people you got to sort through, but he's on that list." (Tr. at 77-78.) On recross, Sturgill conceded that he learned about how to modify his search after the fact if he "had done things a different way," and it was not how this investigation unfolded. (Tr. at 80.)

{¶ 15} The parties provided extensive closing statements to the trial court. Relevant to the instant case, the parties addressed the trial court's concerns as to the R.C. 2935.23 provision that a witness must appear at the hearing. The trial court permitted the parties to file post-hearing briefs in the matter. In March 2022, the parties filed post-hearing supplemental memoranda regarding Mr. Diaw's outstanding motions.

{¶ 16} On October 3, 2022, the trial court denied Mr. Diaw's motion to dismiss but granted his motion to suppress. The trial court first found that the evidence should be suppressed as the state violated the statutory requirements of R.C. 2935.23 by failing to have a witness testify as to information provided in response to the investigative subpoenas. The trial court next found that the language employed in the investigative subpoenas were overly broad and too sweeping to be considered reasonable. Finally, the trial court found that investigative subpoenas violated Mr. Diaw's rights under the Fourth Amendment to the U.S. Constitution and Article One, Section 14 of the Ohio Constitution as he had a reasonable expectation of privacy over the information.

{¶ 17} The state filed a timely appeal on October 7, 2022.

II. ASSIGNMENT OF ERROR

{¶ 18} The state assigns the following as trial court error:

The trial court committed reversible error in granting the defense's motion to suppress.

III. STANDARD OF REVIEW

{¶ 19} Appellate review of a trial court's decision to grant a motion to suppress presents a mixed question of law and fact. State v. Robertson, 10th Dist. No. 22AP-227, 2023-Ohio-2746, ¶ 13, citing State v. Harrison, 166 Ohio St.3d 479, 2021-Ohio-4465, ¶ 11, citing State v. Burnside, 100 Ohio St.3d 152, 2003-Ohio-5372, ¶ 8.

{¶ 20} An appellate court's standard of review of a trial court's decision concerning a motion to suppress is two-fold. (Further citation omitted.) State v. Ivery, 10th Dist. No. 23AP-92, 2023-Ohio-3495, ¶ 30, citing State v. Pilgrim, 184 Ohio App.3d 675, 2009-Ohio-5357, ¶ 13 (10th Dist.). In a suppression hearing, the trial court first assumes the role of the trier of fact and, as such, is best positioned to resolve questions of fact and determine the credibility of the witnesses. Robertson at ¶ 13, citing State v. Mills, 62 Ohio St.3d 357, 366 (1992). Accordingly, a reviewing court should defer to the trial court's factual determinations when supported by "competent, credible evidence." State v. Leak, 145 Ohio St.3d 165, 2016-Ohio-154, ¶ 12, citing Burnside at ¶ 8, citing State v. Fanning, 1 Ohio St.3d 19, 20 (1982). Upon accepting the factual determinations of the trial court, a reviewing court, must then independently resolve whether the facts satisfy the applicable legal standard without deference to the trial court's legal conclusions. Harrison at ¶ 11, citing Burnside at ¶ 8. A reviewing court must consider the trial court's legal conclusions de novo. State v. Oliver, 10th Dist. No. 21AP-449, 2023-Ohio-1550, ¶ 36, citing State v. Banks-Harvey, 152 Ohio St.3d 368, 2018-Ohio-201, ¶ 14, citing Burnside at ¶ 8.

IV. LEGAL ANALYSIS

A. R.C. 2935.23

{¶ 21} The state first argues that the trial court erred by finding that the absence of sworn testimony regarding the contents of the investigative subpoena requires suppression of evidence under R.C. 2935.23.

{¶ 22} R.C. 2935.23 governs the issuance of subpoenas employed in felony investigations. R.C. 2935.23 directs that the state may cause a subpoena to be issued "for any person to give information concerning such felony. The subpoenas shall require the witness to appear forthwith. * * * He shall then be sworn and be examined under oath by the prosecuting attorney, or the court or magistrate, subject to the constitutional rights of the witness." Here, the subpoenas at issue state that the entity "can comply with this Investigative Subpoena without the court appearance * * * by providing the requested information * * * prior to the date scheduled for the appearance." (State's Ex. A-1 through A-7.) The language employed in each of the investigative subpoenas-permitting the subpoenaed third-party to provide the requested information in lieu of appearing in court-conflict with the plain language of R.C. 2935.23. There is no excuse for law enforcement's failure to comply with such an explicit statutory provision.

{¶ 23} While we agree with the trial court that the subpoenas do not reflect the mandatory appearance requirement provided in R.C. 2935.23, the remedy sought by Mr. Diaw, i.e., suppression of the evidence, is not available in this instance. The Supreme Court of Ohio has held that the exclusionary rule is generally reserved for violations of a constitutional nature. State v. Campbell, 170 Ohio St.3d 278, 2022-Ohio-3626, ¶ 22, citing Kettering v. Hollen, 64 Ohio St.2d 232, 234 (1980). Accord State v. Emerson, 134 Ohio St.3d 191, 2012-Ohio-5047, ¶ 32; State v. Jones, 121 Ohio St.3d 103, 2009-Ohio-316, ¶ 15 (finding "a violation of a state statute, * * * in and of itself, [does not] give rise to a Fourth Amendment violation and result in the suppression of evidence"). Thus, absent a" 'legislative mandate requiring the application of the exclusionary rule,'" suppression of the evidence is reserved for constitutional violations. Campbell at ¶ 22, quoting Kettering at 234. Our review of R.C. 2935.23 reveals no express mandate to impose the exclusionary rule for a violation of the statute. Compare R.C. 2933.63(A) (permitting, among other remedies, the suppression of evidence derived from an unlawful wiretap). Accordingly, absent an express legislative directive, we are not permitted to impose the exclusion of evidence in this instance as an available remedy for noncompliance with the statute.

{¶ 24} This court addressed this exact question in State v. Fielding, 10th Dist. No. 13AP-654, 2014-Ohio-3105, ¶ 18-19 (rejecting the argument that evidence obtained from a R.C. 2935.23 investigative subpoena should be suppressed because AT&T failed to appear to testify under oath). At least one other Ohio district court has also concluded that suppression is not an available remedy under R.C. 2935.23. See, e.g., State v. Hamrick, 12th Dist. No. CA2011-01-002, 2011-Ohio-5357, ¶ 15-16; State v. Lemasters, 12th Dist. No. CA2012-12-028, 2013-Ohio-2969. Thus, the trial court erred concluding that the absence of sworn testimony regarding the contents of the investigative subpoena warranted the suppression of evidence under R.C. 2935.23.

B. Investigative Subpoena

{¶ 25} We turn to Mr. Diaw's next argument that the investigative subpoenas were impermissibly broad. Mr. Diaw focuses his argument on the language employed in the Letgo subpoena that requested, among other specific information, "any and all records."

{¶ 26} While distinct in their analyses, subpoenas, like search warrants, can implicate an individual's Fourth Amendment rights. United States v. Bigi, S.D.Ohio No. 3:09-CR-153, 2010 U.S. Dist. LEXIS 105954, *14 (Sept. 22, 2010). Indeed, when it comes to a search warrant or an investigative subpoena, an individual has "[t]he right to be let alone -- the most comprehensive of rights and the most valued by civilized men is not confined literally to search and seizures as such, but extends as well to the orderly taking under compulsion of process." (Internal citation and quotations omitted.) United States v. Morton Salt, Co., 338 U.S. 632, 651-52 (1950). Whereas the issuance of a search warrant requires a showing of probable cause, a subpoena is analyzed only under the Fourth Amendment's general reasonableness standard. Doe v. United States (In re Adm. Subpoena), 253 F.3d 256, 264 (6th Cir.2001), citing In re Subpoena Duces Tecum, 228 F.3d 341, 347 (4th Cir.2000); Hale v. Henkel, 201 U.S. 43, 76, 77 (1906). A subpoena complies with the Fourth Amendment's reasonableness standard when "it is [1] sufficiently limited in scope, [2] relevant in purpose, and [3] specific in directive so that compliance will not be unreasonably burdensome." (Internal citation and quotations omitted.) Carpenter v. United States, 585 U.S. 296, 330 (2018). However, individuals with "no meaningful interests in the records sought by a subpoena" have no rights to object to a third-party's disclosure of the records. Id.

{¶ 27} In the present case, while the requested information in the Letgo subpoena was relevant in purpose to the investigation, the scope of the subpoena was exceedingly broad. The investigative subpoena to Letgo can best be read in two parts: (1) a request for "any and all records" and (2) a demand for specific pieces of information "including all names, addresses, phone numbers, I.P. addresses and email addresses * * * between the dates of 02-16-2020 through 02-18-2020." (State's Ex. A-1.) While the latter portion of subpoena was narrowly tailored-explicitly requesting the name, email address, and IP address associated with the account within a three-day period-the former provision amounts to a broad demand for "any and all records." The initial all-encompassing demand for records is distinct from the subsequent particularized request and is devoid of any limiting language to govern its scope.

{¶ 28} The state contends that the Letgo subpoena was temporally limited. While it is true that a temporal period between February 16, 2020 through February 18, 2020 was provided in the investigative subpoena, the limiting language was in reference to the second particularized request and was subsequent to the initial broad demand for "any and all records." The record bears this out as it appears Letgo interpreted the subpoena to require production of information outside the identified period. In response to the subpoena, Letgo provided the "first_seen.ios" dated February 11, 2020 and the "last_seen.ios" on February 21, 2020. These dates are plainly outside the temporal period identified in the subpoena.

{¶ 29} While the record is foggy as to date of the single coordinate, identified in the production as "last_latitude.ios" and "last_longitude.ios," based on Sturgill's own testimony, we can surmise that it could have also reasonably fallen outside the temporal period. According to Sturgill the latitude and longitude "would track [the] last time [Mr. Diaw] logged into Letgo, and it would have hit his location he was at from there at the time he logged into that site." (Tr. at 75.) If Sturgill is correct, the coordinates would have been captured on the date that corresponds with "last_seen.ios," February 21, 2020. Given linguistic construction the investigative subpoena, as well as the evidence provided, the state's argument that the subpoena was temporally limited is without merit.

{¶ 30} The state also contends that location information was never expressly requested in any of the investigative subpoenas. We find this argument equally unavailing. While it is true location data was not expressly requested, the open-ended nature of the demand for "any and all records" failed to provide any types of guardrails as to the scope of the request. To make matters worse, Sturgill acknowledged the subpoena was drafted to be open-ended and appeared wholly indifferent towards his duty to narrowly tailor the investigative subpoena's demand for production. When asked about the breath of the "any and all records" request, Sturgill stated, "if I don't put any at all, they'll only give me -- they'll only give me just what I specifically spell out. So if -- any information they give me, absolutely, I'll take it. Yes." (Tr. at 53-54.) There is no doubt that Sturgill wanted to make the subpoenas, particularly the Letgo subpoena, as open-ended as possible and welcomed any information he failed to identify in the request.

{¶ 31} This court has previously addressed a similar issue concerning the use of "any and all" language in a search warrant. See State v. Shaskus, 10th Dist. No. 14AP-812, 2016-Ohio-7942, In Shaskus, law enforcement issued a search warrant to Yahoo concerning "any and all emails" in the defendant's account. Id. at ¶ 40. The defendant moved to suppress the evidence gathered from the warrant claiming it was overly broad and not temporally limited. Id. at ¶ 40. While the trial court granted the motion to suppress, we reversed finding that the warrant "contained sufficient subject-matter limitations to satisfy the particularity requirement." (Internal citation omitted.) Id. at ¶ 50. Here, unlike the search warrant in Shaskus, the Letgo subpoena failed to provide any type of subject-matter limitation in the first part of the subpoena. The Letgo investigative subpoena first sought any information associated with the account and a second, particularized request for subscriber information within the relevant three-day period.

{¶ 32} While the Letgo investigative subpoena was impermissibly broad, an illegal search only violates the rights of those that have a" 'legitimate expectation of privacy in the invaded place.'" Bigi at 15, quoting Rakas v. Illinois, 439 U.S. 128, 134 (1978). When an individual has no reasonable expectation of privacy over information provided to a third party, "Fourth Amendment protections are not implicated because a search does not occur." Fielding at ¶ 16. Accordingly, in order to warrant Fourth Amendment protections, a defendant must have a legitimate expectation of privacy attached to the records turned over to the third party. United States v. Miller, 425 U.S. 435, 444 (1976). The question becomes whether Mr. Diaw had a reasonable expectation of privacy over the information obtained through the Letgo investigative subpoena.

C. Third-Party Doctrine

{¶ 33} The Fourth Amendment to the United States Constitution, as made applicable to the states through the Fourteenth Amendment, and Article One, Section 14 of the Ohio Constitution, protect individuals against unreasonable searches and seizures. Banks-Harvey at ¶ 15-17, citing United States v. Ross, 456 U.S. 798, 825 (1982); State v. Jones, 143 Ohio St.3d 266, 2015-Ohio-483, ¶ 12. These safeguards offer a restraint on the government and, more specifically, law enforcement, to protect an individual's privacy interests and security from arbitrary invasions by government officials. State v. Rogers, 10th Dist. No. 21AP-546, 2023-Ohio-2749, ¶ 13, citing Camara v. Mun. Court of San Francisco, 387 U.S. 523, 528 (1967); Ivery at ¶ 34, citing Banks-Harvey at ¶ 17. "The Fourth Amendment protects privacy interests within the reasonable expectation of privacy. That is, '[w]hen an individual "seeks to preserve [something] as private,"' * * * and 'his expectation of privacy is "one that society is prepared to recognize as reasonable." '" State v. Jackson, 171 Ohio St.3d 412, 2022-Ohio-4365, ¶ 58, quoting Carpenter at 304, quoting Katz v. United States, 389 U.S. 347, 351 (1967); Carpenter at 343, quoting Katz at 361 (Harlan, J. concurring).

{¶ 34} Outside several well-established exceptions, warrantless searches are per se unreasonable. Robertson at ¶ 15, citing Los Angeles v. Patel, 576 U.S. 409, 419 (2015), citing Arizona v. Gant, 556 U.S. 332, 338 (2009). The Supreme Court has recognized one such exception under the third-party doctrine. Under the doctrine, the Fourth Amendment generally does not preclude the government from obtaining information voluntarily provided to a third party. State v. Rogers, 10th Dist. No. 21AP-546, 2023-Ohio-2749, ¶ 14, citing Smith v. Maryland, 442 U.S. 735, 743-44 (1979) (finding law enforcement's use of a pen register to capture telephone numbers dialed by the defendant's telephone did not constitute a search under the Fourth Amendment as there was no expectation of privacy when the information was voluntarily turned over to a third party, the telephone company); Miller at 443 (finding a financial institution's disclosure of bank records with law enforcement, in response to a subpoena, did not constitute a search under the Fourth Amendment). Under these circumstances, "the Government is typically free to obtain such information from the recipient without triggering Fourth Amendment protections." Carpenter at 308.

{¶ 35} As a check on improper warrantless searches, United States Supreme Court created the exclusionary rule, which bars the use of evidence obtained in violation of the Fourth Amendment in a criminal proceeding. Davis v. United States, 564 U.S. 229, 236 (2011), citing Elkins v. United States, 364 U.S. 206, 217 (1960). Not only is the initial evidence obtained in violation of the Fourth Amendment from an unconstitutional search excluded but the derivative evidence obtained by exploitation of the illegal search, often referred to as "fruit of the poisonous tree," must also be suppressed. Wong Sun v. United States, 371 U.S. 471, 484-89 (1963); Banks-Harvey at ¶ 25.

{¶ 36} Based upon the information provided by K.W, Sturgill sent a series of investigative subpoenas to various third parties. The following categories of information were obtained in response to the investigative subpoenas: names, addresses, email addresses, IP addresses, and a single latitude and longitude data point. We will consider each type of information in turn.

1. Subscriber Information

{¶ 37} The term "subscriber information" has been applied to basic identifying information that an individual provides to a third party in order to receive services. In an online context, this court has defined "[subscriber information, such as name, address, and phone number, [a]s information that the customer provides to the internet service provider in order to receive internet service." State v. Thornton, 10th Dist. No. 09AP-108, 2009-Ohio-5125, ¶ 13. Federal courts have similarly defined "[subscriber information" to "include the name, address, and other identifying information for the person to whom the phone number is registered." United State v. Beverly, 943 F.3d 225, 231 (5th Cir.2019) fn. 2. The Electronic Communications Privacy Act, 18 U.S.C.S. 2703(c)(2), directs that "[a] provider of electronic communication service or remote computing service," upon receiving an authorized administrative subpoena, shall disclose the following subscriber information: name; address; local and long distance telephone connections records, or records of session times and durations; length of service and types of service utilized; telephone or instrument number or other subscriber number or identity; and means and source of payment for such service (including any credit card or bank account number).For our purposes, however, we need not examine the distinctions in these definitions as the information at issue-name, address, and email address-falls squarely within the general category of subscriber information.

Other states have classified similar material as "subscriber information." See, e.g., California Electronic Communications Privacy Act ("CalECPA"), codified as Cal.Penal Code 1546, et seq. (defining "subscriber information" as "the name, street address, telephone number, email address, or similar contact information provided by the subscriber to the service provider to establish or maintain an account or communication channel, a subscriber or account number or identifier, the length of service, and the types of services used by a user of or subscriber to a service provider."). The statute provides a property right in digitally stored content and online accounts like photographs, text messages, postings, spread sheets, email, etc. The statute "mandates a warrant for state law enforcement access to any CSLI, as well as metadata and information stored on a device or in the cloud." Matthew G. Baker, The Third Party Doctrine and Physical Location: The Privacy Implications of Warrantless Acquisition of Historical Cell Site Location Information, 66 Cath.U.L.Rev. 667, 680 (2017). Such state statutes are informative of what the citizens of each state are willing to accept as reasonable. Id. Ohio, however, has no such statute at this time.

{¶ 38} Prior to Carpenter, federal circuit courts had universally found that an individual had no reasonable expectation of privacy over subscriber information that they provided in their ordinary use of the internet. See United States v. Trader, 981 F.3d 961, 968 (11th Cir.2020), citing United States v. Weast, 811 F.3d 743, 747-48 (5th Cir.2016); United States v. Caira, 833 F.3d 803, 806-09 (7th Cir.2016); United States v. Wheelock, 772 F.3d 825, 828-29 (8th Cir.2014); United States v. Perrine, 518 F.3d 1196, 1204-05 (10th Cir.2008); United States v. Christie, 624 F.3d 558, 573-74 (3d Cir.2010); United States v. Bynum, 604 F.3d 161, 164 (4th Cir.2010). See also Guest v. Leis, 255 F.3d 325, 336 (6th Cir.2001) (finding that "computer users do not have a legitimate expectation of privacy in their subscriber information because they have conveyed it to another person--the system operator."). While Carpenter has modified the third-party analysis, see infra ¶ 47-53, federal circuit courts have continued to reach the same result when it comes to the disclosure of subscriber information to third parties. See United States v. Whipple, 92 F.4th 605, 611-12 (6th Cir.2024); Trader at 968, citing United States v. Morel, 922 F.3d 1, 9 (1st Cir.2019); United States v. Contreras, 905 F.3d 853, 857 (5th Cir.2018); United States v. Wellbeloved-Stone, 777 FedAppx. 605, 607 (4th Cir.2019); United States v. VanDyck, 776 FedAppx. 495, 496 (9th Cir.2019); see also Beverly at 239.

{¶ 39} Ohio courts, including this one, have also found there are no Fourth Amendment protections afforded to the disclosure of subscriber information to third parties. See, e.g., Fielding at ¶ 17, citing Thornton at ¶ 14 ("a customer does not have a reasonable expectation of privacy in subscriber information given to an internet service provider"); see also Hamrick at ¶ 18 (finding appellant had no reasonable expectation of privacy over his subscriber information obtained by law enforcement from Time Warner Cable); Lemasters at ¶ 9 (finding defendant had no reasonable expectation of privacy over subscriber information obtained by the police from his internet service provider). Given the breath of federal and Ohio courts that have addressed this question, we conclude Mr. Diaw had no reasonable expectation of privacy over the disclosure of his subscriber information and, therefore, cannot establish a Fourth Amendment violation.

{¶ 40} Mr. Diaw asks us to apply the analysis in Riley v. California, 573 U.S. 373 (2014), which held that law enforcement generally must obtain a warrant prior to searching the digital contents of a cellphone as incident to a defendant's arrest. The Riley court recognized that cellphones hold "the privacies of life[]" and "[t]he fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought." (Internal citations omitted.) Riley at 403. However, unlike a search of the contents of an individual's cellphone, when a defendant provides subscriber information to an internet or telephone company, they assume the risk of the companies disclosing that information to law enforcement. Wellbeloved-Stone at 607, citing Bynum at 164. As such, an individual has no subjective expectation of privacy in the subscriber information as it was voluntarily conveyed to the company. Id.; see also United States v. McClain, W.D.N.Y. No. 19-CR-40A, 2019 U.S. Dist. LEXIS 229688, *15 (Dec. 9, 2019) (finding subscriber information "certainly does not fall in the category of information addressed in Carpenter and Riley").

2. Internet Protocol ("IP") Address

{¶ 41} An IP address is a "string of numbers associated with a device that had, at one time, accessed a wireless network." United States v. Hood, 920 F.3d 87, 92 (1st Cir.2019). An IP address identifies the location, not necessarily the user, where a device accessed the internet. United States v. Jenkins, N.D.Ga. No. 1:18-CR-00181, 2019 U.S. Dist. LEXIS 62776, *11 (Apr. 11, 2019).

{¶ 42} Federal circuit courts have universally found a defendant has no expectation of privacy over an IP address as the user" 'should know that this information is provided to and used by Internet service providers for the specific purpose of directing the routing of information.'" United States v. Rosenow, 50 F.4th 715, 738 (9th Cir.2022), quoting United States v. Forrester, 512 F.2d 500, 510 (9th Cir.2008). See also Morel at 8-9; United States v. Suing, 712 F.3d 1209, 1213 (8th Cir.2013); Christie at 573. Courts have compared an IP address to a telephone number associated with a landline or information associated with an individual's residence. See United States v. Soybel, 13 F.4th 584, 587 (7th Cir.2021) ("[defendant] has no expectation of privacy in the captured [IP] routing information, any more than the numbers he might dial from a landline telephone"). The Rosenow court analogized an IP address to information an individual would put on the outside of mail, "which the Supreme Court has long held can be searched without a warrant because it is voluntarily transmitted to third parties; therefore, there is no legitimate expectation of privacy in such information." (Internal citation and quotation omitted.) Rosenow at 738. Unlike individual location data or the substance of a communication, an IP address is associated with an individual's residence or other location where an individual accesses the internet; it does not concern a person's daily movements. Contreras at 857. Conversely, the search of the contents of email messages and other private communications, which are comparable to the contents of a sealed letter, generally requires a warrant. Rosenow at 738, citing Forrester at 511.

{¶ 43} This court's prior decisions, which rejected the argument that a third-party disclosure of an IP address warrants Fourth Amendment protections align with federal precedent. See, e.g., Fielding at ¶ 19; Thornton at ¶ 12 (finding the defendant had no reasonable expectation of privacy in the IP address associated with his computer); see also Lemasters at ¶ 9; Hamrick at ¶ 19.

{¶ 44} As both federal and Ohio courts have overwhelmingly found there is no reasonable expectation of privacy on an IP address, Mr. Diaw is not afforded Fourth Amendment protections based on the third-party disclosure of the information to law enforcement in response to the Letgo investigative subpoena.

3. Latitude and Longitude

a. Pre-Carpenter Analysis of Location Data

{¶ 45} While the analysis regarding whether an IP address and subscriber information are afforded Fourth Amendment protections under third-party doctrine is fairly straightforward, the third-party disclosure of the latitude and longitude data point is more complex.

{¶ 46} Prior to Carpenter, federal circuit courts had held that an individual does not have a reasonable expectation of privacy over location data as it fell within established third-party-doctrine analysis. See, e.g., United States v. Thompson, 866 F.3d 1149, 1156, 1160 (10th Cir.2017); United States v. Graham, 824 F.3d 421, 426 (4th Cir.2016) (en banc); United States v. Davis, 785 F.3d 498, 511 (11th Cir.2015) (en banc) (holding that defendant has no "objectively] reasonable expectation of privacy in MetroPCS's business records showing the cell tower locations that wirelessly connected his calls"); In re Application of the United States for Historical Cell Site Data, 724 F.3d 600, 616 (5th Cir.2013) (finding cell site data is not afforded Fourth Amendment protections); In re U.S. for an Order Directing Provider of Electronic Communication Serv. to Disclose Records to Govt., 620 F.3d 304, 313, 317 (3d Cir.2010). This court had reached a similar conclusion. See, e.g., State v. Jones, 10th Dist. No. 18AP-33, 2019-Ohio-2134, ¶ 46 ("At the time, [cell-site location information ("CSLI")] was attainable pursuant to a court order.") Thus, an individual's location data could be distributed at the discretion of the third-party service provider without implicating Fourth Amendment protections. The third-party doctrine analysis, however, shifted after the United States Supreme Court's decision in Carpenter. A brief review is instructive.

The Carpenter court described CSLI as follows:

Cell phones continuously scan their environment looking for the best signal, which generally comes from the closest cell site. Most modern devices, such as smartphones, tap into the wireless network several times a minute whenever their signal is on, even if the owner is not using one of the phone's features. Each time the phone connects to a cell site, it generates a time-stamped record known as cell-site location information ("CSLI"). The precision of this information depends on the size of the geographic area covered by the cell site. The greater the concentration of cell sites, the smaller the coverage area. As data usage from cell phones has increased, wireless carriers have installed more cell sites to handle the traffic. That has led to increasingly compact coverage areas, especially in urban areas.
Carpenter at 300-01.

b. Carpenter

{¶ 47} In 2011, law enforcement suspected that Timothy Carpenter was involved in several robberies around Detroit. Id. at 301. Law enforcement initially arrested several other suspects, one of which confessed to being involved in nine robberies in Michigan and Ohio. Id. The same suspect identified Carpenter as someone involved in the heists and provided the FBI with various telephone numbers. Id. The state applied for court orders, pursuant to the Stored Communications Act, which directed two wireless carriers to disclose Carpenter's historical cell site information for the four months that the robberies took place. Id. at 302. The Stored Communications Act allowed the state to obtain a court order upon offering "specific and articulable facts" that demonstrated "reasonable grounds" to believe the records were "relevant and material to an ongoing criminal investigation." 18 U.S.C.S. 2703(d). "Altogether the Government obtained 12,898 location points cataloging Carpenter's movements-an average of 101 data points per day." Carpenter at 302. Based on the cell-site data, Carpenter was charged with multiple counts of robbery and carrying a firearm during a federal crime of violence. Id. Carpenter moved to suppress the evidence arguing that his Fourth Amendment rights were violated when the state seized his CSLI from the wireless carriers without a valid warrant. Id. The district court denied the motion, and Carpenter was later convicted at trial. Id. at 302-03.

{¶ 48} On appeal, the Sixth Circuit Court of Appeals affirmed the district court's decision to deny the motion to suppress finding Carpenter had no reasonable expectation of privacy over the data as he had voluntarily disclosed the information to the cellphone carriers and, therefore, he was not entitled to Fourth Amendment protections. Id. at 303. The Supreme Court granted certiorari. Id.

{¶ 49} On June 22, 2018, the Supreme Court, by a 5-4 decision, reversed and remanded the judgment. Chief Justice Roberts, joined by Justices Breyer, Ginsburg, Kagan, and Sotomayor delivered the opinion of the Court.

{¶ 50} The question before the Court was "whether the Government conducts a search under the Fourth Amendment when it accesses historical cellphone records that provides a comprehensive chronicle of the user's past movements." Id. at 300. The Court considered "how to apply the Fourth Amendment to a new phenomenon: the ability to chronicle a person's past movements through the record of his cell phone signals." Id. at 309.

{¶ 51} The Court held that law enforcement's acquisition of CSLI data in this case constituted a search under the Fourth Amendment, and the state must generally obtain a warrant supported by probable cause before acquiring such records. Id. at 316. The majority opinion likened the "all-encompassing record of the holder's whereabouts" to United States v. Jones, 565 U.S. 400, 405 (2012) and noted that the data was "detailed, encyclopedic, and effortlessly compiled." Id. at 309, 311. The Court explained that while the data was collected for business purposes, and owned by the cellphone provider, "individuals have a reasonable expectation of privacy [concerning] the whole of their physical movements." Id. at 310. Despite the information being voluntarily provided to cellphone companies, the only way to prevent the collection of the cellphone data is to disconnect oneself from the network. Id. at 315. "[A person's cellphone] faithfully follows its owner beyond public thoroughfares and into private residences, doctor's offices, political headquarters, and other potentially revealing locales." Id. at 311.

In Jones, the Supreme Court considered whether the state conducted a search under the Fourth Amendment when it attached a GPS device to a defendant's vehicle in order to track the vehicle's movements during a 28-day period. The Jones court found the state's actions amounted to a search as "[t]he government physically occupied private property for the purpose of obtaining information" by installing a tracking device and then monitoring the vehicle's movements. Id. at 404.

{¶ 52} The Carpenter court makes clear that the state can no longer assert the third-party doctrine "mechanically appl[ies]" when an individual shares information to a third party. Id. at 314. "In light of the deeply revealing nature of CSLI, its depth, breadth, and comprehensive reach, and the inescapable and automatic nature of its collection, the fact that such information is gathered by a third party does not make it any less deserving of Fourth Amendment protection." Id. at 320. The majority, however, emphasized that Carpenter should be viewed narrowly and does not dispute the application of other third-party doctrine cases "or call into question conventional surveillance techniques and tools, such as security cameras. Nor do we address other business records that might incidentally reveal location information." Id. at 316.

c. Post-Carpenter Analysis of Location Data

{¶ 53} While the decision was initially hailed as groundbreaking, courts have struggled to apply Carpenter as it failed to set out a clear test for determining when information disclosed to a third party is protected by the Fourth Amendment. Matthew Tokson, The Carpenter Test as A Transformation of Fourth Amendment Law, 2023 U.Ill.L.Rev. 507, 517 (2023). As noted in Carpenter, there is "no single rubric [that] definitively resolves which expectations of privacy are entitled to protection." Carpenter at 304. The Carpenter court did, however, identify several factors to consider as part of its analysis. Among the considerations discussed were "the revealing nature of location data, the amount of data collected, the number of people affected, the inescapable and automatic nature of the data disclosure, and the low cost of tracking people via their cell phone." Tokson, 135 Harv.L.Rev. at 1792. While other factors remain viable points to examine the nature of the third-party disclosure, three factors "drive" the analysis: "(1) the revealing nature of the data collected; (2) the amount of data collected; and (3) whether the suspect voluntarily disclosed their information to others." Tokson, 2023 U.Ill.L.Rev. at 510; Tokson, 135 Harv.LRev. at 1851.

See Matthew Tokson, The Aftermath of Carpenter: An Empirical Study of the Fourth Amendment Law, 2018-2021+, 135 Harv.L.Rev. 1790, 1792-93 (2002).

1. Revealing Nature

{¶ 54} The first factor concerns the revealing nature of the data collected. The Carpenter court noted that certain information, such as location data, possess a higher risk of providing an “intimate window into a person's life, revealing not only his particular movements, but through them his ‘familiar, political, professional, religious, and sexual associations.' ” Carpenter at 311, quoting Jones, 565 U.S. at 415 (Sotomayor, J., concurring). The heart of the concern centers on the disclosure of sensitive information regarding a person's life to agents of the state. Tokson, 2023 U.Ill.L.Rev. at 529. "Such data may be used for illegitimate purposes, give state agents undue power over a citizen, cause substantial privacy harms to data subjects, or simply compromise the security promised by the Fourth Amendment." Id. at 529-30.

{¶ 55} There are numerous examples of courts finding law enforcement's use of location information, including a single data point, constituted a search under the Fourth Amendment based, in large part, on the revealing nature of the information. See, e.g., Commonwealth v. Pacheco, 263 A.3d 626 (Pa.2021) (finding defendant had a legitimate expectation of privacy over 108 days of continuous real-time location information); Commonwealth v. Almonor, 482 Mass. 35 (2019). In Almonor, the murder suspect was found in a residence after law enforcement contacted his cell company to reveal his realtime global positioning system coordinates, i.e., "pinging," which led to the defendant's arrest. Id. at 36, 44. The Massachusetts Supreme Court found that "society reasonably expects that the police will not be able to secretly manipulate our personal cell phones for any purpose, let alone for the purpose of transmitting our personal location data." Id. at 44. While Almonor found that the defendant had a reasonable expectation of privacy in the real-time location of his cellphone, it held that exigent circumstances precluded suppression of the evidence as law enforcement "had reasonable grounds to believe that obtaining a warrant would be impracticable because taking the time to do so would have posed a significant risk that the suspect may flee, evidence may be destroyed, or the safety of the police or others may be endangered." Id. at 52. See also State v. Muhammad, 194 Wn.2d 577 (Wa.2019) (finding that while the "ping" of the defendant's cellphone was a search under the Fourth Amendment, it was permissible based on exigent circumstances).

{¶ 56} At least one Ohio appellate court has reached the same conclusion. See, e.g., State v. Gause, 2d Dist. No. 29162, 2022-Ohio-2168, ¶ 19-20 (concluding that exigent circumstances existed justifying the warrantless pinging of the defendant's cellphone as the suspect was armed and had fled the scene of the crime); State v. Davison, 2d Dist. No. 28579, 2021-Ohio-728, ¶ 10-11 (finding exigent circumstances, as well as the good-faith exception, warranted the pinging of the fleeing suspect's cellphone during the morning of the shooting); State v. Snowden, 2d Dist. No. 28096, 2019-Ohio-3006, ¶ 37-40 (finding that while pinging defendant's cellphone the night of the shooting and subsequent day, without a warrant, violated his Fourth Amendment rights, such evidence need not be suppressed as exigent circumstances and the good-faith exception were applicable).

{¶ 57} While courts have taken varying approaches to analyzing real-time location information under Carpenter, they have concluded that when exigent circumstances are present, suppression of the evidence is not warranted. See, e.g., In re Taylor, 6th Cir. No. 22-3553, 2022 U.S. App. LEXIS 30976 (Nov. 8, 2022) (denying order authorizing the district court to consider a second petition for a writ of habeas corpus as the state was absolved of any obligation to obtain a search warrant for his real-time CSLI information based on exigent circumstances); State v. Martin, 8th Dist. No. 108189, 2019-Ohio-4463, ¶ 15-16 (finding Carpenter inapplicable as the use of real-time cellphone location information was not used as evidence but a means to locate the suspect once a warrant was issued for the defendant's arrest).

{¶ 58} While the latitude and longitude data point is the type of information that possess some of the biggest privacy concerns, there are reasons to believe that it is less revealing under the facts of this case. First, the coordinate was historical in nature and not a real-time location. Unlike cases where law enforcement "ping" a defendant's telephone, the location data in this case was meaningfully removed from Mr. Diaw's actual location. When historical cell-site information, or coordinate in this case, provide a mere snapshot of Mr. Diaw's location, the revealing nature of the information is limited. Moreover, the actual location of the latitude and longitude data point must be considered. While the coordinate at issue, which corresponds to the McDonald's located on East Broad Street is near Mr. Diaw's apartment, his single movement in a public space is far less revealing than if it corresponded with his actual residence. See United States v. Hammond, 996 F.3d 374, 389 (7th Cir.2021) (concluding the use of real-time CSLI for a few hours on public roadways to find armed suspect did not implicate the Fourth Amendment); United States v. Riley, 858 F.3d 1012, 1018 (6th Cir.2017) (finding that the use of seven hours of GPS location data to find a suspect for whom a valid search warrant had been issued was not a search "so long as the tracking [did] not reveal movements within the home (or hotel room), [did] not cross the sacred threshold of the home."). (Emphasis sic.) Given the single data point was historical in nature and was not associated with Mr. Diaw's residence, we find this factor favors the state's position that the information does not warrant Fourth Amendment protection.

2. Amount

{¶ 59} Next, we consider the amount of data that was collected by law enforcement. In Carpenter, the government gathered 12,898 location points over 127 days, or 101 data points per day, which provided a comprehensive chronicle of the defendant's prior movements. Id. at 302. "Large amounts of data such as those at issue in Carpenter increase the potential for invasions of the target's privacy." Tokson, 2023 U.Ill.l.Rev. at 530. It is difficult to dispute that the 12,898 location points collected in Carpenter amount to an exceedingly high volume of location data. See also State v. Brown, 331 Conn. 258 (2019) (finding three months of historical CSLI data, without a warrant, violated the defendant's Fourth Amendment rights). However, even much smaller amounts of location information could constitute as search as Carpenter noted that "for our purposes today to hold that accessing seven days of CSLI constitutes a Fourth Amendment search." Carpenter at 310, fn. 3. However, courts are mixed as to whether historical CSLI of less than seven days constitutes a search under the Fourth Amendment. Compare People v. Edwards, 63 Misc.3d 827, 828 (N.Y.Sup.Ct.2019) (finding two days of CSLI data was not a search pursuant to Fourth Amendment) with State v. Gibbs, S.C. Dist. No. 2020-UP-244, 2020 S.C. App.Unpub. LEXIS 301 (Aug. 19, 2020) (finding five days of historical CSLI data was a search).

{¶ 60} In the instant case, however, law enforcement obtained a single latitude and longitude data point. This is a far cry from the 12,898 location points at issue in Carpenter or even the seven days of data the Carpenter court noted would warrant Fourth Amendment protections. The limited cases that have applied the Carpenter analysis to smaller amounts of historical location information have reached the same conclusion. In In re Google Location History Litigation, 428 F.Supp.3d 185, 198 (N.D.Cal.2019), the district court found that the location information collected and stored by Google media fell outside Carpenter as "not all of Plaintiffs movements were being collected, only specific movements or locations." (Emphasis omitted.) The Google court reasoned that "[s]uch 'bits and pieces' do[es] not meet the standard of privacy established in Carpenter." Id. While there are several cases that have found Carpenter applies to a single location data point, see supra ¶ 55-56, those cases concern real-time location information exposing a far more "intimate window into a person's life." Carpenter 311.

3. Voluntarily Disclosure

{¶ 61} The third factor concerns whether the location data at issue was voluntarily disclosed. This factor originates from the line of third-party doctrine cases prior to the limitation imposed by Carpenter. Tokson, 2023 U.Ill.L.Rev. at 532. "In theory, information that is not voluntarily disclosed to another is more private than information voluntarily disclosed to some other party or parties." Id. We must consider whether the disclosure was truly voluntary compared to those that are practically unavoidable. In Carpenter, the CSLI data was deemed unavoidable as the information was automatically collected by the cellphone. "Virtually any activity on the phone generates CSLI, including incoming calls, texts, or e-mails and countless other data connections that a phone automatically makes when checking for news, weather, or social media updates." Carpenter at 315. A cellphone is an "inescapable" part of life giving the owner little choice in carrying the device during their daily movements. Id. Unlike the CSLI data that was collected from Carpenter through the course of his mere possession of the cellphone, the latitude and longitude data point was voluntarily conveyed through Mr. Diaw's use of Letgo. While this point is somewhat unclear in the record, Mr. Diaw either downloaded the Letgo application on his cellphone or used the Letgo website on a computer. See Oct. 5, 2023 Oral Argument 26:11; 28:40. In either case, Mr. Diaw took the affirmative step of creating an account on the platform and took no steps to avoid disclosure of the location. Unlike the practically unavoidable obligation of carrying a cellphone, the usage of Letgo is certainly not "inescapable" or an essential part of modern life. Carpenter at 315, citing Riley at 385; Carpenter at 320.

{¶ 62} Other courts have found that the voluntary use of certain websites or applications bolstered their finding that there was no reasonable expectation of privacy in the third-party disclosure. In United States v. Bledsoe, 630 F.Supp.3d 1 (D.C.2022), the district court found that there was no reasonable expectation of privacy over the location data provided by Facebook to investigators of accounts livestreaming or uploading videos at the United States Capitol on January 6, 2021. "[U]nlike * * * CSLI * * * the only way that Facebook was able to determine when and where a user engaged in account activity on January 6, 2021, is by virtue of the user making an affirmative and voluntary choice to download the Facebook or Instagram application * * * create an account * * * and, critically, take no available steps to avoid disclosing his location." Id. at *13. See also Sanchez v. Los Angeles Dept. of Transp., 39 F.4th 548, 559-61 (9th Cir.2022) (finding that the collection of data by the Los Angeles Department of Transportation was not a search, and did not violate the Fourth Amendment, as the plaintiff voluntarily agreed to provide location data to the e-scooter operators every time he rented a device). As was the case in Bledsoe and Sanchez, Mr. Diaw's use of Letgo was no automatic and inescapable but a voluntary disclosure of his location information.

{¶ 63} Thus, while we agree with the trial court that the Letgo investigative subpoena was impermissibly broad, there was no reasonable expectation of privacy over the single coordinate disclosed in the investigative subpoena. See Bigi at 17 (pre-Carpenter case finding that while the subpoenas were overly broad, defendant had no reasonable expectation of privacy, under the third-party doctrine, over the information). Concerning the scope of the other investigative subpoenas in this case, as the information obtained from the subpoenas fell under the categories of subscriber information or IP address information, we need not examine the particular language of the subpoenas as Mr. Diaw had no reasonable expectation of privacy over the information voluntarily disclosed to the third-party providers. Accordingly, any potential defects in the form and scope of the other investigative subpoenas do not trigger protections under the Fourth Amendment to warrant suppress of the evidence.

D. Remaining arguments

{¶ 64} The state asserts that even if there was a Fourth Amendment violation in this instance, suppression of the evidence was improper under both the inevitability doctrine (Appellant's Brief at 29-30) and the good-faith doctrine (Appellant's Brief at 31-32). Because we find that there was no reasonable expectation of privacy concerning the evidence provided in the investigative subpoenas, we decline to address the remaining arguments. State v. Williams, 10th Dist. No. 06AP-842, 2007-Ohio-1015, ¶ 21, citing App.R. 12(A)(1)(c).

{¶ 65} The state's sole assignment of error is sustained. V. CONCLUSION

{¶ 66} To be sure, there were many missteps in the investigative phase of this case. While suppression of evidence is not permitted, law enforcement's haphazard use of investigative subpoenas to collect Mr. Diaw's personal information, while disclosed voluntarily, is the type of behavior that creates distrust in our legal system. While the state's appeal is meritorious in this instance, it would be well served to cure these issues going forward. Without remedial action, the state operates at its own peril by jeopardizing lawful investigations and risking further injury to the constitutional rights of Ohioans.

{¶ 67} Based on the foregoing, the state's sole assignment of error is sustained. This matter is remanded for further proceeding consistent with this judgment.

Judgment reversed; cause remanded.

BOGGS and EDELSTEIN, JJ., concur.


Summaries of

State v. Diaw

Court of Appeals of Ohio, Tenth District
Jun 11, 2024
2024 Ohio 2237 (Ohio Ct. App. 2024)
Case details for

State v. Diaw

Case Details

Full title:State of Ohio, Plaintiff-Appellant, v. Mamadou Diaw, Defendant-Appellee.

Court:Court of Appeals of Ohio, Tenth District

Date published: Jun 11, 2024

Citations

2024 Ohio 2237 (Ohio Ct. App. 2024)