Site icon Thomas J. Daley

CROSSOVER: Warrantless Cell-Phone Seizure Upheld on Exigent Circumstances—Blueprint for Preserving Digital Evidence in Family-Violence & Abuse Cases

New Texas Court of Appeals Opinion - Analyzed for Family Law Attorneys

Davis v. State, 09-24-00121-CR, March 11, 2026.

On appeal from the 75th District Court Liberty County, Texas.

Synopsis

The Ninth Court of Appeals affirmed denial of a motion to suppress where officers seized a suspect’s cell phone without a warrant, then later obtained a warrant to search its contents. The court held a warrantless seizure is permissible when officers have probable cause the phone contains evidence and reasonably believe that evidence faces imminent destruction (e.g., deletion of texts/images).

Relevance to Family Law

Family-law cases increasingly turn on digital proof—texts, DMs, location metadata, photos, and app communications—particularly in family-violence, coercive-control, and child-abuse fact patterns that trigger SAPCR restrictions, protective orders, or supervised possession. Davis supplies a litigation-ready framework for arguing (and anticipating) “evidence destruction” urgency: when a phone is the evidentiary container, the critical event is often preservation (seizure/securement) before a full forensic extraction, and courts will credit deletion risk when the record supports it. For family litigators, that translates into better-designed TROs/protective-order relief, sharper evidentiary hearings, and more disciplined coordination with parallel criminal investigations so digital evidence survives long enough to be admitted in Title 5 proceedings.

Case Summary

Fact Summary

The defendant was investigated for aggravated sexual assault of a child. During a recorded interview, the lead officer requested the defendant’s cell phone as evidence. The defendant resisted, emphasizing the phone’s cost and his need for communication while job hunting, and insisted he would not surrender it without a court order.

The officer articulated concern that if the defendant left with the phone, he would delete or destroy evidence—specifically digital communications and potential images/messages reflecting contact with the victim. That concern was not hypothetical: during the interview the defendant admitted he had communicated with the victim and admitted that, after learning the victim’s true age, he deleted messages and blocked her. The officer ultimately told the defendant that because the phone was used in the commission of a crime, he had authority to take it and would arrest for resistance/obstruction if the defendant refused. The defendant then surrendered the phone. Officers later obtained a warrant to search the phone’s contents and copied its data.

The defense moved to suppress, attacking both the initial seizure and the subsequent warrant (as “fruit of the poisonous tree” and based on claimed affidavit defects). The trial court denied suppression, expressly finding probable cause and exigent circumstances based on the defendant’s communications with the victim and the risk of destruction.

Issues Decided

Rules Applied

Application

The court treated the seizure question as a classic exigent-circumstances problem: did officers have (1) probable cause to believe evidence would be found on the phone and (2) a reasonable basis to believe the evidence would be destroyed if they delayed to obtain a warrant?

On probable cause, the record contained more than a generalized hunch about “phones having evidence.” The officer testified he had already seen texts indicating the defendant used the phone to communicate with the complainant, and the defendant himself confirmed the communications. That anchored the probable-cause analysis in particularized facts tying this phone to this offense.

On exigency, the court credited the officer’s concern that the defendant—if allowed to leave with the device—could delete messages/images before a warrant could be obtained and executed. The interview recording was damaging to the defense on this point: the defendant admitted he had previously deleted messages and blocked the complainant after learning her age. In other words, the deletion risk was supported by the suspect’s own conduct and admissions, not merely a law-enforcement generalization about how easy deletion is.

The court also implicitly accepted a practical sequence that matters in digital-evidence cases: seize now to prevent deletion; search later under warrant. The seizure preserved the status quo long enough for officers to obtain judicial authorization for forensic review. That sequencing—temporary restraint to prevent spoliation followed by warrant-based extraction—is precisely what makes the exigent-seizure theory most defensible.

Holding

The court held the trial court did not err in denying suppression because the State established an exception to the warrant requirement: officers had probable cause to believe the phone contained evidence of the crime and a reasonable belief that evidence faced immediate destruction or deletion, creating exigent circumstances permitting a warrantless seizure.

The court further affirmed the trial court’s ruling rejecting the “fruit of the poisonous tree” attack predicated on the seizure being unlawful; because the seizure was permissible under exigent circumstances, the later warrant-based search was not tainted on that ground.

Practical Application

For Texas family-law litigators, Davis is less about police powers in the abstract and more about how judges evaluate deletion risk when digital evidence is central to violence, abuse, stalking, or exploitation narratives.

  1. Protective order and TRO practice (preservation-forward relief). In cases where a respondent is likely to purge texts/DMs or wipe cloud accounts, plead and prove deletion risk with specificity: prior deletions, threats to “erase,” device-control behavior, or admissions resembling Davis (“I deleted the messages”). Request narrowly tailored relief aimed at preservation: prohibition on destroying ESI, turnover of specified devices for imaging by a neutral, credential/password preservation, and cloud account preservation instructions.
  2. Parallel proceedings strategy (criminal + SAPCR). If a criminal investigation exists, do not undermine admissibility by pushing informal “hand me your phone” exchanges that create coercion narratives. Instead, coordinate so law enforcement uses the seize-to-preserve / warrant-to-search sequence when deletion risk is real, while the family case uses civil tools (protective orders, discovery, subpoenas, preservation letters) to secure overlapping proof.
  3. Cross-examination roadmap when you’re challenging the seizure narrative. Davis shows what makes exigency persuasive: concrete facts tying the phone to the offense and concrete facts showing deletion propensity. In family cases, when an opposing party tries to bootstrap “they could delete it” into emergency relief, force the specifics: What did they delete before? When? What statements show intent? What apps? What device? Vague “phones are easy to delete” arguments should be treated as insufficient.
  4. Evidentiary hearings: build the record around “why immediate.” Courts decide exigency from the totality at the moment of seizure. In a family context (particularly temporary-orders hearings), the analog is building a record for immediate injunctive relief to prevent spoliation. Put on testimony about prior deletions, auto-delete settings, encrypted apps, device access control, and cloud sync behavior.

Checklists

Building a “Deletion Risk” Record (Family-Violence / Abuse Cases)

TRO / Protective-Order Relief Aimed at Digital Preservation

Coordinating with Criminal Counsel / Law Enforcement Without Poisoning Admissibility

Defensive Checklist (If Your Client Is Accused of Deleting / Hiding Digital Evidence)

Citation

Davis v. State, No. 09-24-00121-CR (Tex. App.—Beaumont Mar. 11, 2026) (mem. op.).

Full Opinion

Read the full opinion

Family Law Crossover

Although Davis is a criminal suppression decision, it can be “weaponized” in family court in two high-value ways.

First, it strengthens the argument that deletion risk is not speculative when the record shows prior deletion behavior. In a divorce/SAPCR involving family violence or sexual-abuse allegations, you can cite Davis’s logic to support emergency relief designed to prevent spoliation—especially when the opposing party admits to deleting messages, changing accounts, or blocking communications once allegations surface. The persuasive move is to frame digital evidence as uniquely fragile (easy to delete, easy to overwrite) and to show the court why this litigant is likely to destroy it.

Second, Davis offers a disciplined structure for distinguishing preservation from inspection. In family litigation, opponents often overreach by seeking immediate access to a device’s contents (which invites privacy and proportionality objections). Davis supports a more defensible posture: secure/preserve first (status quo protection), then litigate scope and method of review under court supervision (neutral imaging, privilege filters, staged disclosure). That sequencing is both more likely to be granted at temporary orders and harder to overturn later because it mirrors how appellate courts justify urgent digital-evidence interventions when destruction is a realistic threat.

~~f7eea487-8c62-41d0-bc4a-ef8124822e55~~

Share this content:

Exit mobile version