MA: There is no requirement of a search protocol in the SW but it is advisable to restrain execution in computer searches

An IP address as a source of child pornography provides sufficient probable cause and nexus to search the subscriber’s home and computer. There are no search protocols for the warrant but it is advisable to use them. An administrative subpoena can be used for IP subscriber information. Commonwealth v. Molina, 2017 Mass. LEXIS 109 (Feb. 7, 2017):

In the McDermott case, we explained that no advance approval was required for computer search methods because the magistrate issuing the warrant “likely does not have the technical expertise to assess the propriety of a particular forensic analysis.” McDermott, 448 Mass. at 776. It is for precisely this reason, however, that additional guidance at the present time would be very useful concerning ways that those conducting digital searches can minimize intrusions into the private electronic files of individuals who may have no connection at all with the child pornography or other suspected criminal activity being investigated. Nearly a decade’s worth of technological advancements have taken place since this court decided McDermott, and as was clear at oral argument in this case, we are concerned about the lack of protocols or formal guidelines for executing search warrants for digital evidence. Cf. Kerr, Executing Warrants for Digital Evidence: The Case for Use Restrictions on Nonresponsive Data, 48 Tex. Tech. L. Rev. 1, 17-18 (2015) (“The best way to minimize the unwarranted intrusions upon privacy for computer searches is to impose use restrictions on the nonresponsive data revealed in the course of the search”). The Attorney General’s existing digital evidence guide offers helpful parameters, and we invite the Attorney General to develop further guidance for the conduct of digital searches that could be made available to both State and local officers conducting digital searches.

Accord: Commonwealth v. Martinez, 2017 Mass. LEXIS 108 (Feb. 7, 2017).

This entry was posted in Computer and cloud searches. Bookmark the permalink.

Comments are closed.