Commonwealth v. Hinds

768 N.E.2d 1067, 437 Mass. 54, 2002 Mass. LEXIS 379
CourtMassachusetts Supreme Judicial Court
DecidedMay 24, 2002
StatusPublished
Cited by42 cases

This text of 768 N.E.2d 1067 (Commonwealth v. Hinds) is published on Counsel Stack Legal Research, covering Massachusetts Supreme Judicial Court primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Commonwealth v. Hinds, 768 N.E.2d 1067, 437 Mass. 54, 2002 Mass. LEXIS 379 (Mass. 2002).

Opinion

Spina, J.

The defendant was charged in seven indictments with unlawful possession of child pornography. G. L. c. 272, § 29C. A Superior Court judge denied a pretrial motion to suppress images found on his personal computer. After a jury-[55]*55waived trial, the defendant was convicted as charged on all seven indictments. The defendant appealed, arguing that (1) the judge erred in denying his motion to suppress and (2) the evidence was insufficient to prove that the defendant possessed child pornography. We transferred the case here on our own motion. We affirm the convictions.

1. Facts. We summarize the facts found by the judge in his ruling on the defendant’s motion to suppress, “supplemented by uncontroverted facts adduced at the hearing.” Commonwealth v. Torres, 433 Mass. 669, 670 (2001). On October 16, 1998, the defendant’s uncle, John Hinds, was arrested in connection with two homicides and an aggravated assault against other members of the defendant’s family. Police from several departments were involved in the investigation. They suspected that the shootings were motivated by a family dispute regarding the sale of property at 157 Fifth Street, Cambridge (Fifth Street), where John resided. As part of an ongoing investigation, they obtained a search warrant to seize John’s computer at Fifth Street to examine any electronic mail, as well as other documents related to the family dispute. State Trooper Owen J. Boyle, Detective James Dwyer of the Cambridge police, and Detective Sergeant John J. McLean of the Medford police executed the warrant on October 20, 1998.

To gain entry to Fifth Street, the police went to adjacent property at 207½ Charles Street (Charles Street), where other family members, namely, the defendant; his brother, Thomas Hinds; their father, Charles Hinds, Sr.; and their grandmother, Mary Hinds resided. There they met Thomas, who let them into the Fifth Street home. McLean, who had worked for the Attorney General’s “high tech squad” and had substantial experience in the investigation of computer related crimes, secured John’s computer without viewing any of its contents.

In doing so, however, McLean discovered a “category 5” cabling wire plugged into a network interface card on John’s computer. Knowing that other computers attached to a network could share data with John’s computer, McLean asked Thomas where the wire led. Thomas, a UNIX system administrator at Sun Micro Systems, told him that the wire led from John’s computer to a “hub” connected to Thomas’s and the defendant’s [56]*56computers at Charles Street. The defendant, who held bachelor’s and master’s degrees in computer science from Boston University, had set up the network linking the computers. McLean asked Thomas for permission to search the Charles Street computers, because relevant electronic mail could readily have been stored by John on those computers as well. Boyle told Thomas that, if he did not consent, they would obtain a warrant to search the Charles Street residence. Police had thus far obtained seven search warrants in the homicide investigation, and the family had been cooperative with the investigation. McLean told Thomas that he also would need the defendant’s permission before examining the defendant’s computer. He emphasized that the police were looking for electronic mail evidence pertaining to the homicides.

The defendant was not at home, but Thomas was able to contact him by using a paging device. Thomas spoke with the defendant about McLean’s request. The defendant told Thomas that he did not want McLean to look at his computer until he returned. Thomas allowed McLean to examine his own computer, but first activated the network “hub,” absent any request from McLean, located in the defendant’s bedroom. McLean then began searching Thomas’s system for electronic mail while Thomas watched. Noticing a directory entitled “Chuck,” McLean asked Thomas what it was. Thomas said that it was the defendant’s network hard drive. McLean then asked Thomas for permission to search the “Chuck” directory from Thomas’s computer. Thomas telephoned the defendant, who spoke directly with McLean. McLean identified himself and asked the defendant for permission to search his computer for electronic mail. The defendant asked, “Is that all you’re looking for?” McLean said yes, and told the defendant that he could refuse, but added that a warrant could be obtained. The defendant said that he would be home in one-half hour and told McLean to go ahead, but only to look for electronic mail.

McLean then returned to Thomas’s computer, where he searched the defendant’s “Chuck” directory. There were no security measures in place to prevent him from doing so. Although the defendant had once installed security measures, he had removed them. McLean scrolled through the “Chuck” [57]*57directory, looking for electronic mail files, i.e., file names with “EML” or similar default extensions. Although the “Chuck” directory did not on its face disclose any files related to electronic mail, McLean observed numerous file names with the extension “JPG,” which indicated that the files contained graphic images. Many of the files had sexually explicit titles, some indicating that children were possibly the subjects, including files entitled “10YRSLUT, YNGSX15, KIDSEX1, TEENSEX, 10YOANAL, and 13YRSUCK,” to name a few. Of particular concern to McLean was a file entitled “2BOYS.JPG.” From a prior case, McLean recognized “2BOYS.JPG” as a file name for a specific child pornography image. McLean opened the file and confirmed that “2BOYS.JPG” was child pornography. Having done so, he posted Dwyer at Thomas’s computer, then went to the defendant’s room and opened “2BOYS.JPG” on the defendant’s computer to verify that it was the source of the file.

When the defendant arrived, McLean told him that a search of his computer had revealed child pornography. McLean seized the defendant’s computer and later obtained a search warrant. A subsequent search revealed thousands of images of child pornography stored on the defendant’s computer.

2. Motion to suppress, (a) Issues relating to Thomas’s consent. The defendant first argues that McLean’s entry into Charles Street was unlawful and that any subsequent search was therefore invalid because (1) the police lacked justification to expand the search under the warrant for Fifth Street and (2) the judge did not explicitly find that Thomas consented to McLean entering Charles Street.

“The ‘judge’s denial of the defendant’s motion [to suppress] implies resolution of factual issues in favor of the Commonwealth.’ ” Commonwealth v. Grandison, 433 Mass. 135, 137 (2001), quoting Commonwealth v. Lanoue, 392 Mass. 583, 586 n.2, 588 (1984).1 There was evidence to support valid consent by Thomas for McLean’s entry into Charles Street. Me-[58]*58Lean testified that Thomas allowed him into Charles Street. Thomas testified, and the judge found, that he consented to a search of his own computer, which was at Charles Street, for electronic mail. Thus, even in the absence of an explicit finding that Thomas consented to McLean’s entry, the judge’s implied ruling to that effect was adequately supported by the record. Accordingly, the Commonwealth was not required to prove that circumstances justified an expansion of the search under the warrant for Fifth Street.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Commonwealth v. Kao Lanois
Massachusetts Superior Court, 2025
State of Iowa v. Thomas Dean Jesse
Court of Appeals of Iowa, 2025
Commonwealth v. Michael P. Pircio.
Massachusetts Appeals Court, 2023
Commonwealth v. Mario Rosa.
Massachusetts Appeals Court, 2023
Commonwealth v. Ferreira
119 N.E.3d 278 (Massachusetts Supreme Judicial Court, 2019)
Commonwealth v. Mattier
474 Mass. 261 (Massachusetts Supreme Judicial Court, 2016)
Commonwealth v. Garrett
473 Mass. 257 (Massachusetts Supreme Judicial Court, 2015)
Commonwealth v. Jones-Pannell
35 N.E.3d 357 (Massachusetts Supreme Judicial Court, 2015)
Commonwealth v. Thompson
87 Mass. App. Ct. 572 (Massachusetts Appeals Court, 2015)
Commonwealth v. Cullity
Massachusetts Supreme Judicial Court, 2015
Commonwealth v. Buswell
9 N.E.3d 276 (Massachusetts Supreme Judicial Court, 2014)
Commonwealth v. Gray
990 N.E.2d 528 (Massachusetts Supreme Judicial Court, 2013)
Cooper v. Charter Communications, Inc.
945 F. Supp. 2d 233 (D. Massachusetts, 2013)
Commonwealth v. Buswell
979 N.E.2d 768 (Massachusetts Appeals Court, 2012)
Commonwealth v. Hall
952 N.E.2d 951 (Massachusetts Appeals Court, 2011)
Commonwealth v. Walorz
944 N.E.2d 1061 (Massachusetts Appeals Court, 2011)
Commonwealth v. Romero
26 Mass. L. Rptr. 458 (Massachusetts Superior Court, 2010)
Commonwealth v. Zubiel
921 N.E.2d 78 (Massachusetts Supreme Judicial Court, 2010)
Commonwealth v. Farnsworth
920 N.E.2d 45 (Massachusetts Appeals Court, 2010)
Commonwealth v. Tyree
919 N.E.2d 660 (Massachusetts Supreme Judicial Court, 2010)

Cite This Page — Counsel Stack

Bluebook (online)
768 N.E.2d 1067, 437 Mass. 54, 2002 Mass. LEXIS 379, Counsel Stack Legal Research, https://law.counselstack.com/opinion/commonwealth-v-hinds-mass-2002.