← Back to Library

Davis v. State

COA09March 11, 2026

Litigation Takeaway

"To secure immediate preservation of digital evidence in family violence or abuse cases, litigators should build a record of specific "deletion risk"—such as prior deletions or admissions of blocking contacts—to justify emergency relief or turnover orders under an exigent circumstances framework."

Davis v. State, 09-24-00121-CR, March 11, 2026.

On appeal from the 75th District Court Liberty County, Texas.

Synopsis

The Ninth Court of Appeals affirmed denial of a motion to suppress where officers seized a suspect’s cell phone without a warrant, then later obtained a warrant to search its contents. The court held a warrantless seizure is permissible when officers have probable cause the phone contains evidence and reasonably believe that evidence faces imminent destruction (e.g., deletion of texts/images).

Relevance to Family Law

Family-law cases increasingly turn on digital proof—texts, DMs, location metadata, photos, and app communications—particularly in family-violence, coercive-control, and child-abuse fact patterns that trigger SAPCR restrictions, protective orders, or supervised possession. Davis supplies a litigation-ready framework for arguing (and anticipating) “evidence destruction” urgency: when a phone is the evidentiary container, the critical event is often preservation (seizure/securement) before a full forensic extraction, and courts will credit deletion risk when the record supports it. For family litigators, that translates into better-designed TROs/protective-order relief, sharper evidentiary hearings, and more disciplined coordination with parallel criminal investigations so digital evidence survives long enough to be admitted in Title 5 proceedings.

Case Summary

Fact Summary

The defendant was investigated for aggravated sexual assault of a child. During a recorded interview, the lead officer requested the defendant’s cell phone as evidence. The defendant resisted, emphasizing the phone’s cost and his need for communication while job hunting, and insisted he would not surrender it without a court order. The officer articulated concern that if the defendant left with the phone, he would delete or destroy evidence—specifically digital communications and potential images/messages reflecting contact with the victim. That concern was not hypothetical: during the interview the defendant admitted he had communicated with the victim and admitted that, after learning the victim’s true age, he deleted messages and blocked her. The officer ultimately told the defendant that because the phone was used in the commission of a crime, he had authority to take it and would arrest for resistance/obstruction if the defendant refused. The defendant then surrendered the phone. Officers later obtained a warrant to search the phone’s contents and copied its data. The defense moved to suppress, attacking both the initial seizure and the subsequent warrant (as “fruit of the poisonous tree” and based on claimed affidavit defects). The trial court denied suppression, expressly finding probable cause and exigent circumstances based on the defendant’s communications with the victim and the risk of destruction.

Issues Decided

  • Whether the warrantless seizure of a cell phone violated the Fourth Amendment where officers claimed probable cause and exigent circumstances based on risk of evidence destruction.
  • Whether the later search warrant for the phone’s contents was invalid as fruit of an unlawful seizure (and related challenges tied to how the surrender/seizure was characterized).

Rules Applied

  • Fourth Amendment: Warrantless searches/seizures are per se unreasonable unless within a recognized exception.
  • Exigent circumstances exception (evidence-destruction rationale): Officers may act without a warrant when there is a compelling need for immediate action and no time to secure a warrant; preventing destruction of evidence is a recognized exigency.
  • Two-step exigency framework (as described by the court’s cited authorities):
    1. Probable cause that the item contains evidence/instrumentality of a crime.
    2. Exigency requiring immediate action (including imminent destruction/deletion).
  • Standard of review (suppression rulings): Bifurcated—historical facts with deference; ultimate reasonableness de novo; implied findings supported by the record control when the trial court makes no explicit findings.

Application

The court treated the seizure question as a classic exigent-circumstances problem: did officers have (1) probable cause to believe evidence would be found on the phone and (2) a reasonable basis to believe the evidence would be destroyed if they delayed to obtain a warrant? On probable cause, the record contained more than a generalized hunch about “phones having evidence.” The officer testified he had already seen texts indicating the defendant used the phone to communicate with the complainant, and the defendant himself confirmed the communications. That anchored the probable-cause analysis in particularized facts tying this phone to this offense. On exigency, the court credited the officer’s concern that the defendant—if allowed to leave with the device—could delete messages/images before a warrant could be obtained and executed. The interview recording was damaging to the defense on this point: the defendant admitted he had previously deleted messages and blocked the complainant after learning her age. In other words, the deletion risk was supported by the suspect’s own conduct and admissions, not merely a law-enforcement generalization about how easy deletion is. The court also implicitly accepted a practical sequence that matters in digital-evidence cases: seize now to prevent deletion; search later under warrant. The seizure preserved the status quo long enough for officers to obtain judicial authorization for forensic review. That sequencing—temporary restraint to prevent spoliation followed by warrant-based extraction—is precisely what makes the exigent-seizure theory most defensible.

Holding

The court held the trial court did not err in denying suppression because the State established an exception to the warrant requirement: officers had probable cause to believe the phone contained evidence of the crime and a reasonable belief that evidence faced immediate destruction or deletion, creating exigent circumstances permitting a warrantless seizure. The court further affirmed the trial court’s ruling rejecting the “fruit of the poisonous tree” attack predicated on the seizure being unlawful; because the seizure was permissible under exigent circumstances, the later warrant-based search was not tainted on that ground.

Practical Application

For Texas family-law litigators, Davis is less about police powers in the abstract and more about how judges evaluate deletion risk when digital evidence is central to violence, abuse, stalking, or exploitation narratives.

  1. Protective order and TRO practice (preservation-forward relief). In cases where a respondent is likely to purge texts/DMs or wipe cloud accounts, plead and prove deletion risk with specificity: prior deletions, threats to “erase,” device-control behavior, or admissions resembling Davis (“I deleted the messages”). Request narrowly tailored relief aimed at preservation: prohibition on destroying ESI, turnover of specified devices for imaging by a neutral, credential/password preservation, and cloud account preservation instructions.
  2. Parallel proceedings strategy (criminal + SAPCR). If a criminal investigation exists, do not undermine admissibility by pushing informal “hand me your phone” exchanges that create coercion narratives. Instead, coordinate so law enforcement uses the seize-to-preserve / warrant-to-search sequence when deletion risk is real, while the family case uses civil tools (protective orders, discovery, subpoenas, preservation letters) to secure overlapping proof.
  3. Cross-examination roadmap when you’re challenging the seizure narrative. Davis shows what makes exigency persuasive: concrete facts tying the phone to the offense and concrete facts showing deletion propensity. In family cases, when an opposing party tries to bootstrap “they could delete it” into emergency relief, force the specifics: What did they delete before? When? What statements show intent? What apps? What device? Vague “phones are easy to delete” arguments should be treated as insufficient.
  4. Evidentiary hearings: build the record around “why immediate.” Courts decide exigency from the totality at the moment of seizure. In a family context (particularly temporary-orders hearings), the analog is building a record for immediate injunctive relief to prevent spoliation. Put on testimony about prior deletions, auto-delete settings, encrypted apps, device access control, and cloud sync behavior.

Checklists

Building a “Deletion Risk” Record (Family-Violence / Abuse Cases)

  • Obtain sworn testimony or affidavits identifying specific communications at issue (date ranges, platforms, phone numbers/handles).
  • Develop proof of prior spoliation: deleted threads, missing chats, “message removed” indicators, changed phone numbers, wiped devices, factory resets.
  • Capture admissions: “I deleted them,” “I blocked her,” “you’ll never prove it,” “I’ll wipe my phone.”
  • Document technical facts that increase risk: auto-delete settings, disappearing-message apps, shared-device access, frequent device swaps, remote-wipe capability.
  • Tie the evidence to contested family issues: violence, coercion, child endangerment, alienation, threats, violations of orders, stalking.

TRO / Protective-Order Relief Aimed at Digital Preservation

  • Plead for an express anti-spoliation injunction covering texts, DMs, photos, videos, call logs, location history, and cloud backups.
  • Request an order prohibiting changing passwords, disabling backups, deleting accounts, or enabling disappearing messages.
  • Seek device turnover only if narrowly tailored (specific device(s), time-limited, preservation/imaging purpose, chain-of-custody provisions).
  • Consider a neutral forensic examiner with a protocol for: intake, imaging, hash verification, privilege filtering, and a staged production.
  • Include compliance deadlines and enforcement mechanisms (contempt language; clear, objective duties).

Coordinating with Criminal Counsel / Law Enforcement Without Poisoning Admissibility

  • Avoid “DIY” collection from the other side (especially surreptitious access to a spouse’s phone/account) that triggers privacy and exclusion fights.
  • If law enforcement is involved, encourage a preservation-first approach: secure device to prevent deletion, then warrant for extraction.
  • Maintain clean chain-of-custody for any screenshots/exports your client already possesses (when/how obtained, original files, metadata preservation).
  • Use subpoenas to providers early (with correct identifiers) and request preservation under provider policies while litigation proceeds.

Defensive Checklist (If Your Client Is Accused of Deleting / Hiding Digital Evidence)

  • Immediately issue a preservation directive to the client (written) and document compliance steps.
  • Disable auto-delete/disappearing features and preserve devices in their current state.
  • Consider a voluntary neutral imaging to demonstrate preservation and reduce adverse-inference risk.
  • Prepare to explain missing data with benign causes (device failure, account lockout, carrier retention limits) supported by records.

Citation

Davis v. State, No. 09-24-00121-CR (Tex. App.—Beaumont Mar. 11, 2026) (mem. op.).

Full Opinion

Read the full opinion

Family Law Crossover

Although Davis is a criminal suppression decision, it can be “weaponized” in family court in two high-value ways. First, it strengthens the argument that deletion risk is not speculative when the record shows prior deletion behavior. In a divorce/SAPCR involving family violence or sexual-abuse allegations, you can cite Davis’s logic to support emergency relief designed to prevent spoliation—especially when the opposing party admits to deleting messages, changing accounts, or blocking communications once allegations surface. The persuasive move is to frame digital evidence as uniquely fragile (easy to delete, easy to overwrite) and to show the court why this litigant is likely to destroy it. Second, Davis offers a disciplined structure for distinguishing preservation from inspection. In family litigation, opponents often overreach by seeking immediate access to a device’s contents (which invites privacy and proportionality objections). Davis supports a more defensible posture: secure/preserve first (status quo protection), then litigate scope and method of review under court supervision (neutral imaging, privilege filters, staged disclosure). That sequencing is both more likely to be granted at temporary orders and harder to overturn later because it mirrors how appellate courts justify urgent digital-evidence interventions when destruction is a realistic threat. ~~f7eea487-8c62-41d0-bc4a-ef8124822e55~~

Thomas J. Daley

Analysis by Thomas J. Daley

Lead Litigation Attorney

Thomas J. Daley is a board-certified family law attorney. He has guided more than 225 clients to successful resolution of their cases over his 18 years of experience.

Schedule a Consultation

Secure a direct consultation with Thomas J. Daley. Brief our team on the specifics of your case.