453 Mass. 102 | Mass. | 2009
The defendant was convicted of possession of child pornography in violation of G. L. c. 272, § 29C. On appeal he asserts error in the denial of his motion to suppress child pornography found on his computer because (1) the warrantless seizure of his computer was unlawful; (2) the affidavit in support of the search warrant did not furnish probable cause to believe that his computer contained child pornography; and (3) the search of his computer over a period of months was unreasonable and in violation of G. L. c. 276, § 3A. We granted the defendant’s application for direct appellate review. Because we conclude that the search warrant authorizing the search of the defendant’s private files was not supported by probable cause that they contained child pornography, we vacate the order denying his motion to suppress and reverse the judgments of conviction.
1. Warrantless seizure. We summarize the findings of the motion judge, supplemented by uncontested testimony from the motion hearing.
On May 21, 2002, James Smyth (James), a teacher and the technology director at the Northeast Metropolitan Vocational High School (high school) in Wakefield, was informed that an unauthorized computer named Joester7437 (Joester) was connected to the high school’s network. James directed Holly Shep-ardson (Shepardson), a network specialist at the high school, to investigate Joester’s contents and physical location on the high school’s premises. From her computer, Shepardson accessed Joester’s open share on the high school’s network.
Shepardson then reported Joester’s presence on the network to Timothy Smyth (Timothy), James’s son and the high school’s network manager. While trying to ascertain Joester’s physical location within the high school, Timothy detected what appeared to be five unauthorized computers on the school’s network.*
On the advice of James and before the police arrived, vice-principals Nickole and Angela Antonelli went to the electronics shop and asked the students and the defendant to go to the library. Sometime thereafter, Officer Maglio and Detective Lawrence James, a member of the Medford police department’s computer crime unit, arrived at the electronics shop. Detective James spoke with James and Timothy as to what they had observed in Joester’s open share. With the permission of Vice Principal Antonelli and James, Detective James, using his own notebook computer, accessed the school’s network and opened Joester’s open share. He found, inter alla, several movies, including “Spiderman.” Detective James concluded that the copy of “Spiderman” was un
While searching for unauthorized computers in the electronics shop, Timothy came across a school-owned server named Night-crawler in the defendant’s office, which was adjacent to the electronics shop.
Detective James, having been apprised of Timothy’s observations of pirated movies on Sinister’s open share, seized Sinister, which belonged to the defendant, on probable cause to believe that it contained child pornography and copyrighted intellectual property. Detective James did not look at the contents of Sinister’s open share prior to securing it.
In reviewing a motion to suppress, we accord substantial deference to the motion judge’s subsidiary findings and will not disturb them absent clear error. Commonwealth v. Jones, 375 Mass. 349, 354 (1978). Our review of the application of constitutional principles to those facts, however, is plenary. Commonwealth v. Haas, 373 Mass. 545, 550 (1977), S.C., 398 Mass. 806 (1986).
The defendant makes a number of arguments challenging whether Sinister was properly seized pursuant to an exception to the warrant requirement.
2. Probable cause. The defendant contends that Officer Maglio’s affidavit did not establish probable cause to believe that there was child pornography on Sinister.*
In reviewing a finding of probable cause, we consider only the facts recited in the affidavit and any reasonable inferences therefrom. Commonwealth v. Allen, 406 Mass. 575, 578 (1990). We summarize the facts recited in Officer Maglio’s affidavit.
The affidavit recounted how the presence of an unauthorized
Using an open network connection on Joester, Timothy accessed Nightcrawler, a “computer/server” on the network, and reported observing another network computer that contained a list of file folders and directories “indicating] 60-70 movie titles that were available for viewing on the computer named ‘Sinister’ .... [Timothy] indicated three of these titles to be ‘Top Gun,’ a ‘Knight’s Tale,’ and ‘Spiderman.’ ” Based on his training and experience in computer investigations and computer networking, Officer Maglio stated that he reasonably believed that the “above mentioned electronic media files have been shared amongst the aforementioned computer systems through their existing shared resources and do reasonably believe that these files exist in electronic format on both of these computer systems.” Sinister subsequently was located on the defendant’s desk and seized “with the probable cause that it contained graphic child pornographic images, intellectual property and copy-written materials.”
After Sinister’s seizure, Officer Maglio and Detective Richard Cass interviewed the defendant.
On May 30, 2002, Officer Maglio applied for a search warrant to search Sinister’s hard drives and several electronic data storage devices found in Sinister. The affidavit in support of the search warrant stated that Officer Maglio had been a police officer for fifteen years; had studied numerous software programs, hardware devices, books, articles, journals, and papers relating to computer security, computer crime, and high technology crime investigations; and had received specialized computer crime investigation training. Officer Maglio indicated that some computer users encrypt, booby trap, hide, or otherwise conceal electronically stored data “in an attempt to hide their activities and prevent the collection of evidence against them.” He also stated that persons with a demonstrated interest in child pornography were likely to retain such images for an extended period of time and use multiple computers, electronic mail, and Internet accounts.
Based on the forgoing, the application requested permission to search Sinister’s hard drives and the other electronic data storage devices for, inter alla, child pornography; any textual files referring to “past sexual acts and/or attempted sexual acts and/or solicitations involving the request for child pornography”; and copyrighted material. Citing the potential technical difficulties in recovering electronically stored data, Officer Maglio requested permission “to make exact duplicate copies of selected computer storage/media evidence for further forensic examination” and proposed to file an initial return of service within seven days, see G. L. c. 276, § 3A, and a supplemental return of service after the seven-day period.
An assistant clerk-magistrate in the Malden Division of the District Court Department issued the requested warrant, but did not address Officer Maglio’s request for time beyond the seven-day period to file a supplemental return for purposes of completing a forensic analysis of the copies of Sinister’s hard drives and assorted electronic data storage devices.
A search warrant may issue only on a showing of probable cause. Commonwealth v. Byfield, 413 Mass. 426, 428 (1992). Under the Fourth Amendment and art. 14, probable cause requires a “substantial basis,” Commonwealth v. Stewart, 358 Mass. 747, 749 (1971), for concluding that “the items sought are related to the criminal activity under investigation, and that they reasonably may be expected to be located in the place to be searched at the time the search warrant issues.” Commonwealth v. Cinelli, 389 Mass. 197, 213, cert, denied, 464 U.S. 860 (1983). See Commonwealth v. O’Day, 440 Mass. 296, 301 (2003); Commonwealth v. Upton, 394 Mass. 363, 370 (1985). “In dealing with probable cause, ... as the very name implies, we deal
In reviewing a finding of probable cause, the affidavit “should be interpreted ‘in a commonsense and realistic fashion,’ United States v. Ventresca, 380 U.S. 102, 108 (1965). See Commonwealth v. Burt, 393 Mass. 703, 714 (1985), and ‘read as a whole, not parsed, severed, and subjected to hypercritical analysis.’ Commonwealth v. Blake, 413 Mass. 823, 827 (1992).” Commonwealth v. Donahue, 430 Mass. 710, 712 (2000). An inference drawn from the affidavit, “if not forbidden by some rule of law, need only be reasonable and possible; it need not be necessary or inescapable.” Commonwealth v. Beckett, 373 Mass. 329, 341 (1977).
After reviewing Officer Maglio’s affidavit, we conclude that the affidavit, read as a whole and in a nontechnical manner, does not establish probable cause to believe that child pornography was located among the defendant’s private files. The portions of the affidavit suggesting that the defendant’s private files contained child pornography consisted of (1) the fact that both Joester and Sinister had a copy of the recently released movie Spiderman, suggesting that the movie had passed from one computer to another; (2) the fact that child pornography had been observed in Joester’s open share; and (3) Officer Ma-glio’s statement that the defendant “could not guarantee that there were not any child pornographic images stored in electronic format within his computer.” None of these facts, even when considered together, provided a “substantial basis” to believe that the defendant’s private files contained child pornography.
With respect to the presence of the Spiderman movie on both
The Commonwealth urges us to draw an adverse inference from the defendant’s admission that he had a personal collection of pornography on his computer. We decline to do so. The affidavit provides no basis to conclude that an interest in adult pornography (which, if not obscene, is constitutionally protected, see Miller v. California, 413 U.S. 15, 24-25 [1973]; Commonwealth v. Donahue, 358 Mass. 803 [1970]) is a basis to infer an interest in child pornography. See United States v. Falso, supra at 122 (rejecting inference between sexual abuse of minor and possession of child pornography where association was neither stated nor supported in affidavit).
3. General Laws c. 276, § 3A. The result we reach in this case makes it unnecessary to decide the question whether failure to complete forensic examination of the defendant’s computer within seven days constitutes a violation of G. L. c. 276, § 3A, and requires suppression of the results of the search of his computer. However, where the question is one of public importance, is likely to arise again, and has been fully briefed, we exercise our discretion and consider the issue. See Allen v. Boston Redevelopment Auth., 450 Mass. 242, 254 n.20 (2007), citing Lockhart v. Attorney Gen., 390 Mass. 780, 783 (1984).
General Laws c. 276, § 3A, provides:
“Every officer to whom a warrant to search is issued shall return the same to the court by which it was issued as soon as it has been served and in any event not later than seven days from the date of issuance thereof, with a return of his doings thereon; provided, however, that a justice of the superior court may at any time receive complaints and issue search warrants returnable in seven days before a district court named in such warrant and in that event the officer shall make his return to such district court as directed.”
The “required warrant return procedures are ministerial, and
4. Conclusion. The order denying the defendant’s motion to suppress is hereby vacated and the judgments of conviction are reversed.
So ordered.
Given our conclusion that there was no probable cause to believe that the defendant had child pornography on his computer, we do not reach the defendant’s claim that the colloquy regarding the waiver of his right to a jury trial was inadequate.
We acknowledge the amicus brief submitted by the National Center for Missing and Exploited Children in support of the Commonwealth.
An open share facilitates the sharing of files among computers on a network by making certain resources on a computer available to other computers on the network. To create an open share, a computer user places the files to be
The school had genetically denominated its computers. For example, a computer in the electronic shop might be named Electronics 1. The five unauthorized computers had unique names such as Joester7437 and Sinister.
Timothy testified that a server is “the same as a desktop computer, other than the fact that its primary usage is to be used for others to remotely access it, to remotely use it to store files and things of that nature.”
We note that contrary to the defendant’s understanding of the ruling below,
The Commonwealth contends, and we agree, that the potential destruction or loss of evidence on Sinister created an exigency justifying the warrantless seizure of Sinister. See Illinois v. McArthur, 531 U.S. 326, 334 (2001) (“We have found no case in which this Court has held unlawful a temporary seizure that was supported by probable cause and was designed to prevent the loss of evidence while the police diligently obtained a warrant in a reasonable period
The defendant does not challenge those portions of the search warrant pertaining to copyrighted intellectual property.
The details of what was discovered have been described in the previous section. They were included in the affidavit and are intentionally not duplicated here.
The defendant received Miranda warnings prior to the interview.
The affidavit recounting the interview does not state whether the defendant had stored these items in his open share, his private files, or both.
The affidavit did not state whether the defendant indicated that his pornography collection was in Sinister’s open share, his private files, or both.
Nothing in the affidavit indicates whether the defendant was referring to the files students placed in the “Drops” folder, other files in Sinister’s open share, the defendant’s private files, or his computer generally.
Neither party has made any distinction between Sinister’s hard drives and the electronic data storage devices, mostly compact discs, found inside Sinister. For ease of reference, we refer to the hard drives and peripheral storage devices collectively as Sinister.
At the time of the motion to suppress hearing in February, 2004, Detective James had not written a report of his forensic examination of Sinister. He explained, however, that EnCase software allowed him to “look at the file structures, files, folders, and information contained on the hard drive.”
In this file, Detective James found pirated movies and software, utilities to reverse engineer software, and adult pornography. He could not recall whether he found any child pornography. He confirmed that the files in “Joester transfers” were the same files as the files on Joester’s open share by running a “hash,” a complicated mathematical algorithm that produces similar output if files are identical and dissimilar output if they are not. See Howard, Don’t Cache out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files, 19 Berkeley Tech. L.J. 1227, 1233-1234 (2004).
Detective James’s testimony at the suppression hearing does not indicate whether the child pornography found on Sinister was found in Sinister’s open share, the defendant’s private files, or both. At trial, Detective James testified that he found the pornographic images giving rise to the indictments in the defendant’s private files.
We do not address whether the child pornography found in the defendant’s private files would have been in plain view while searching those files for copyrighted material, see Commonwealth v. Hinds, 437 Mass. 54, 61 (2002) (child pornography in plain view during consented-to search for electronic