Commonwealth v. Molina

71 N.E.3d 117, 476 Mass. 388
CourtMassachusetts Supreme Judicial Court
DecidedFebruary 7, 2017
DocketSJC 12022
StatusPublished
Cited by9 cases

This text of 71 N.E.3d 117 (Commonwealth v. Molina) is published on Counsel Stack Legal Research, covering Massachusetts Supreme Judicial Court primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Commonwealth v. Molina, 71 N.E.3d 117, 476 Mass. 388 (Mass. 2017).

Opinion

Botsford, J.

The defendant, Josué Molina, appeals from his child pornography convictions under G. L. c. 272, §§ 29B and 29C, on three grounds. First, he argues that the search warrant for the apartment in which he was living was overbroad as to places and things to be searched. We disagree, concluding that the search warrant was appropriately particularized. Second, the defendant challenges the validity of the administrative subpoena that issued under G. L. c. 271, § 17B, for Internet service records; he argues that the subpoena, to be constitutional, could only be issued based on a showing of probable cause. We similarly reject this argument. Finally, the defendant argues that the Commonwealth failed to prove that he had the lascivious intent necessary to support a conviction under G. L. c. 272, § 29B (§ 29B). Although we agree with the defendant that lascivious intent is required to be proved with respect to every type of conduct proscribed by § 29B, we conclude that this requirement was met in this case. We affirm the defendant’s convictions.

The Commonwealth cross-appeals, arguing that it is entitled to a restitution hearing in this case, and that the victim for whom the Commonwealth seeks restitution is not required as a matter of law to appear and testify in order to protect the defendant’s constitutional right of confrontation. We agree, and remand for the requested restitution hearing.

1. Background. 1 a. File-sharing. The dissemination of child pornography is facilitated by free “peer-to-peer” file-sharing programs, which allow users to directly connect to other users’ computers in order to search and download files shared by other users. See United States v. McLellan, 792 F.3d 200, 205 (1st Cir.), cert. denied, 136 S. Ct. 494 (2015). Ares is one such file-sharing *390 program, freely available to the general public for download. Ares requires users to accept a license agreement explaining that any files stored in the program’s default download location, called “My Shared Folder,” are accessible to other users. Users may move downloaded files out of this default folder and save them elsewhere, beyond the reach of other Ares users.

Another version of the Ares program, known as Roundup Ares, is available only to law enforcement. By conducting searches using Roundup Ares of terms commonly associated with child pornography, a law enforcement investigator can generate the Internet protocol (IP) addresses 2 of program users sharing suspected files of child pornography. Every computer file has a unique identifier known as a “secure hash algorithm” (hash value). Composed of thirty-two characters, hash values are like “digital fingerprints” allowing law enforcement agencies to recognize files previously identified as child pornography. See Commonwealth v. Martinez, 476 Mass. 410, 412 & n.1 (2017).

b. Facts. On March 12, 2012, State police Trooper Michael Murphy conducted a search for child pornography by using the Roundup Ares program. His search indicated that a computer associated with the IP address 108.49.7.93 might then be sharing child pornography files. By connecting directly to that computer, Murphy was able to view a list of the files in its shared folder. Among the listed file titles, Murphy recognized terms commonly associated with child pornography and proceeded to download two complete video files. He viewed both and determined that *391 they depicted child pornography, specifically, nude prepube scent females engaged in sexual conduct.

In order to identify the account holder associated with the IP address, at Murphy’s request, the district attorney for the Essex district sent an administrative subpoena to Verizon Internet Services, Inc. (Verizon), pursuant to G. L. c. 271, § 17B. Verizon responded, indicating that IP address 108.49.7.93 was associated with a subscriber named “Hermes Delcid” at a certain address in Revere (apartment). Murphy then referred the investigation to the cyber crime division in the office of the Attorney General.

As a member of that division, State police Trooper Daniel Herman conducted physical surveillance of the apartment, and observed outside the house a mailbox with five names on it, including Delcid’s (and also including the defendant’s). Herman performed as well a check of registry of motor vehicles records, which confirmed that address as Delcid’s apartment. Based on this information, on April 2, 2012, State police Trooper Mark Walsh, also of the Attorney General’s cyber crime division, applied for and obtained a warrant to search the apartment and in particular for the following: electronic devices containing evidence of child pornography; evidence of child pornography in any other format; evidence of use, control, ownership, or access to the Verizon Internet account of Delcid at that address; evidence of ownership, access, or control of the peer-to-peer network that was operating with IP address 108.49.7.93; evidence of custody or control of the apartment; and evidence of use, control, ownership, possession, or access to electronic devices at the apartment. Walsh’s supporting affidavit detailed his experience, summarized the investigation, and provided background information on peer-to-peer file sharing and the Ares file-sharing program. See note 1, supra. The search warrant authorized the search of the apartment described without naming any person to be searched.

State police officers executed the search warrant on the morning of April 4, 2012; some officers proceeded into the apartment while others remained in the driveway. Inside the apartment, the officers found Delcid, his wife, and a small child. Forensic examiner Mark Scichilone 3 “previewed” a computer located in the living room and belonging to Delcid, but excluded it from further search when his preliminary review yielded no files con *392 sistent with child pornography. In a bedroom later identified as the defendant’s, officers observed the Ares program operating on an open laptop computer. 4 Scichilone photographed the computer screen, which showed downloads and uploads of child pornography files in progress from and to other computers.

In the driveway, officers observed an idling motor vehicle with someone sitting in the front passenger seat. State police Lieutenant Steven Fennessy approached the vehicle and spoke to its occupant, who was the defendant. After being informed by Fennessy that he was not under arrest, the defendant stated that he lived in the apartment, 5 that he owned a laptop computer located in his bedroom at the front of the apartment, and that he used the Ares program. In response, Fennessy advised the defendant of the Miranda rights, and the defendant stated that he was willing to continue the conversation.

At that point, Fennessy and the defendant moved to an unmarked police vehicle, where the defendant signed a Miranda waiver form and the rest of the interview was recorded.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Commonwealth v. Christopher J. Clayton.
Massachusetts Appeals Court, 2025
Commonwealth v. Andrew A. Padilla
Massachusetts Appeals Court, 2024
Commonwealth v. Janvier
Massachusetts Appeals Court, 2024
Commonwealth v. Vargas
111 N.E.3d 1112 (Massachusetts Appeals Court, 2018)
Commonwealth v. Keplin
103 N.E.3d 770 (Massachusetts Appeals Court, 2018)
Commonwealth v. Perkins
Massachusetts Supreme Judicial Court, 2017
Commonwealth v. Krasnecky
94 N.E.3d 436 (Massachusetts Appeals Court, 2017)
Commonwealth v. Martinez
71 N.E.3d 105 (Massachusetts Supreme Judicial Court, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
71 N.E.3d 117, 476 Mass. 388, Counsel Stack Legal Research, https://law.counselstack.com/opinion/commonwealth-v-molina-mass-2017.