NOTICE: All slip opinions and orders are subject to formal
revision and are superseded by the advance sheets and bound
volumes of the Official Reports. If you find a typographical
error or other formal error, please notify the Reporter of
Decisions, Supreme Judicial Court, John Adams Courthouse, 1
Pemberton Square, Suite 2500, Boston, MA 02108-1750; (617) 557-
1030; SJCReporter@sjc.state.ma.us
SJC-11674
COMMONWEALTH vs. EARL T. FULGIAM
(and thirteen companion cases1).
Suffolk. October 11, 2016. - May 5, 2017.
Present: Gants, C.J., Botsford, Lenk, Hines, Lowy, & Budd, JJ.2
Homicide. Felony-Murder Rule. Robbery. Firearms. Cellular
Telephone. Constitutional Law, Search and seizure,
Probable cause. Search and Seizure, Warrant, Probable
cause. Probable Cause. Evidence, Fingerprints, Expert
opinion, Prior misconduct, Relevancy and materiality.
Witness, Expert. Practice, Criminal, Capital case,
Warrant.
Indictments found and returned in the Superior Court
Department on December 21, 2011.
The cases were tried before Peter M. Lauriat, J.
Elizabeth Caddick for Earl T. Fulgiam.
Esther J. Horwich for Michael T. Corbin.
Zachary Hillman, Assistant District Attorney (John P.
Pappas, Assistant District Attorney, also present) for the
Commonwealth.
1
Six against Earl T. Fulgiam and seven against Michael T.
Corbin.
2
Justice Botsford participated in the deliberation on this
case prior to her retirement.
2
HINES, J. On July 25, 2011, armed intruders entered the
apartment occupied by the victims, Kevin Thomas, Jr., and Billie
Marie Kee, who were robbed and killed. In May, 2013, a Superior
Court jury found the defendants, Earl T. Fulgiam and Michael T.
Corbin, guilty as joint venturers of murder in the first degree
of both victims based on the theories of deliberate
premeditation, extreme atrocity or cruelty, and felony-murder
with armed robbery as the predicate felony. The defendants also
were convicted of unlawful possession of a firearm and unlawful
possession of a large capacity feeding device.3 On appeal, the
defendants assert error in the admission of (1) certain cellular
telephone records in violation of their rights under art. 14 of
the Massachusetts Declaration of Rights and the Fourth and Sixth
Amendments to the United States Constitution; (2) fingerprint
cards attributed to the defendants without proper authentication
or reliability; and (3) expert testimony related to the
fingerprint analysis. Corbin independently claims that repeated
3
The defendants' convictions of armed robbery of the
victims were dismissed as duplicative and their convictions of
unlawfully carrying a loaded firearm were filed with the
defendants' consent. The defendants were sentenced to
consecutive terms of life without the possibility of parole;
from four to five years on the firearm convictions, to be served
from and after the sentences for murder; and from nine to ten
years on the unlawful possession of a large capacity feeding
device convictions, to be served concurrent with the firearms
convictions.
3
references to gang affiliation created a substantial likelihood
of a miscarriage of justice. We affirm the convictions and
decline to grant relief pursuant to G. L. c. 278, § 33E.
Background. We summarize the evidence as the jury could
have found it, reserving additional facts for later discussion.
On July 25, 2011, a couple who lived on the second floor of an
apartment building on Hyde Park Avenue, in the Hyde Park section
of Boston, awoke to the sound of gunshots at around 11:55 P.M.
They heard between six and eight gunshots that the woman
believed came from an apartment below. The couple looked out of
their bedroom window, and saw six or seven men running out of
the entrance to their building. The woman telephoned 911 at
11:57 P.M.4
The men split up. Some of them ran straight across Hyde
Park Avenue. At that moment, a passenger in a vehicle
approaching the victim's apartment building saw three men run in
front of her vehicle; one of the men carried what looked like a
white pillow case. The men got into a grey or silver sedan so
quickly that a man's foot was hanging outside the vehicle as it
sped away. None of the witnesses was able to give more than a
general description of the men, except that one man was
4
This neighbor placed four cellular telephone calls to 911
that evening. Only the calls placed at 11:57 P.M. and 12:41
A.M. are relevant here.
4
heavyset;5 the witnesses could only guess at the race or
ethnicity of the men they observed.
At 12:41 A.M. on July 26, 2011, Boston police responded to
the scene and were directed to the victim's apartment. They
found a large watch on the floor near the front entrance to the
building. Kee, dressed in a bloody shirt and underwear, was
found lying face down on the floor just inside the apartment.
She had suffered four gunshot wounds and multiple stab wounds,
and she was pronounced dead at the scene. Kee's cause of death
was gunshot wounds to the torso and injuries to the lungs, ribs,
and spine.
Thomas, dressed in a T-shirt, shorts, and socks, was found
in the front bedroom, lying on his back over a pile of clothing;
his legs were bound at the ankles with black wire. He had
suffered seven gunshot wounds and four stab wounds to his body,
and he was pronounced dead at the scene. Thomas's cause of
death was gunshot wounds to the torso and neck.
The victims' apartment had been ransacked. Broken glass
and blood were on the floor, clothes were strewn about, and the
cabinets and drawers were open in the kitchen and bathroom.
There were no signs of forced entry; the front door was ajar,
with the lock intact, and the back doors were locked from the
5
Fulgiam's height and weight are listed on his State police
fingerprint card as five feet, ten inches tall and 300 pounds.
5
inside. Although the officers observed no "land line" telephone
in the apartment, they did not recover any cellular telephones.
A curling iron with its cord cut and two knives with brownish-
red stains were found near Kee's body. The curling iron cord
matched the wire that was used to bind Thomas's ankles.
In the front bedroom, in a tall bureau, officers found a
packet of photographs, two of which depicted Thomas with Fulgiam
and Corbin, at Thomas's apartment, sitting on the couch in front
of stacks of United States currency. Near Thomas's body
officers found a black backpack with what appeared to be a bag
of marijuana inside.
On July 27, 2011, a subsequent search of the basement
revealed two plastic bags of what appeared to be "crack"
cocaine, and two digital scales. Based on the all of the
evidence that the police officers had found during their
investigation, they surmised that the assailants were likely
known to the victims and that the murders were likely the result
of a drug robbery.
In the front yard, officers recovered a loaded nine
millimeter semiautomatic pistol with a magazine and a loaded .38
caliber silver revolver. A diamond encrusted ring was found on
Hyde Park Avenue.
John Golden, Thomas's best friend, testified that Thomas
sold large amounts of marijuana and cocaine. On the day of the
6
murders, Golden saw approximately $5,000 in the bureau. When
Golden was shown the photograph depicting Thomas, Corbin, and
Fulgiam with the bundles of cash, Golden estimated the amount to
be between $12,000 and $13,000. Police were able to determine
the date of the photograph as May 11, 2011. Golden also
identified the watch and the ring that had been recovered as
belonging to Thomas. Golden described Thomas as being
"paranoid," so much so that he insisted that even trusted
friends call before coming to his apartment.
On July 29, 2011, a latent print from the nine millimeter
semiautomatic pistol recovered from the scene was
"individualized," or matched, to Fulgiam. Thirteen spent nine
millimeter shell casings, eight spent nine millimeter bullets,
and four bullet fragments were recovered from the scene and from
the victims. Analysis of the firearms revealed that the nine
millimeter semiautomatic contained a magazine that held twenty
rounds of ammunition; eight were recovered in the magazine. All
of the bullets, bullet fragments, and shell casings had been
fired from the nine millimeter semiautomatic pistol.
A detective learned that the victims' cellular telephones
had not been recovered, so he requested and obtained traces on
both. Thomas's cellular telephone records showed that a certain
cellular telephone number was listed in Thomas's telephone
records for July 25, 2011. Police learned that this telephone
7
had been stolen that afternoon between 4:30 P.M. and 5:30 P.M.
The owner told police that he did not recognize Thomas's
cellular telephone number or the number later identified as
Fulgiam's cellular telephone number, both of which were listed
in his call detail records for July 25, 2011. The Commonwealth
issued administrative subpoenas for Fulgiam's cellular telephone
call detail records and for a cellular telephone number ending
in 2898, which was later connected to Corbin.6 The police
discovered that Corbin and Thomas had been in contact, via short
message service messages (text messages), or telephone calls,
several times on July 25, 2011. Fulgiam and Corbin also had
been in telephonic contact that day.
On August 8, 2011, two detectives interviewed Fulgiam at
his home. At this time the police had not sought an arrest
warrant for Fulgiam. Fulgiam told the detectives that he and
Thomas had known one another since the early to mid-2000s, and
that he knew Thomas very well. Fulgiam admitted that he and
Thomas were in the drug business together and that he would meet
6
Fulgiam's call detail and subscriber information was
originally obtained through an administrative subpoena,
discussed infra, issued on August 4, 2011. On August 16, 2011,
additional administrative subpoenas issued for both Fulgiam and
Corbin's subscriber and call detail information. Both Fulgiam
and Corbin's cellular telephone records information, including
call detail information records, subscriber information, cell
site location information (CSLI), and, for Corbin, the content
of text messages, were subsequently obtained through a court
order pursuant to 18 U.S.C. § 2703(d) (2006), also discussed
infra.
8
with Thomas one or two times per month, at one of their homes to
conduct business. He estimated that it had been about one month
since he had last met with Thomas, but could not remember
whether it had been at his home or at Thomas's home. He last
communicated with Thomas via text message on July 17. Fulgiam
had Thomas's cellular telephone number, and he stated that he
changed his own cellular telephone number two weeks prior7
because a woman had been stalking him. Fulgiam was not aware of
Thomas having disputes with anyone and noted that Thomas had a
lot more money than he did. Fulgiam opined that whoever killed
Thomas had to have been close to him.
The two detectives interviewed Corbin at his home on August
10, 2011. At that time, he was not under arrest. One of the
detectives had previously been in telephonic contact with
Corbin,8 who agreed to meet with the detectives. Corbin told the
detectives that he had known Thomas since Corbin was thirteen
years old. Corbin was equivocal about when his last
communication with Thomas occurred; he first said it had been a
7
The murders occurred exactly two weeks before the day of
Fulgiam's interview.
8
Corbin's cellular telephone account was not listed in his
name, nor did the address given match where Corbin was living at
the time of his interview with police. Corbin's cellular
telephone service provider, Metro PCS, is an advance pay company
which offers a plan providing thirty days of service for a
monthly fee of forty dollars. The company does not conduct a
credit check or verify customer's identification information.
9
month prior, but later said it could have been weeks or days
before Thomas was killed. He stated that the last time he was
in Thomas's apartment was on May 1, 2011, but that he had been
in the apartment many times. Corbin mentioned that Thomas was
not a showy guy, and that he had a watch and ring, but only wore
them on the weekends. He also noted that Thomas was a smart and
careful person and that one had to inform Thomas before coming
to his home.
On September 14, 2011, police learned that fingerprint
analysts had individualized to Corbin's right thumbprint a
latent print found on the curling iron that had been recovered
from the victim's home. On October 27, 2011, pursuant to a
search warrant, detectives seized Corbin's cellular telephone
ending with the number 2898 (2898 number) and discovered
photographs of Fulgiam, as well as both Fulgiam and Thomas's
numbers programmed into the contact list. That same day, the
police obtained arrest warrants for Corbin and Fulgiam.
Discussion. 1. Admission of cellular telephone records.
a. Fulgiam's claim. On August 15, 2011, after a review of
Thomas's cellular telephone records, the Commonwealth sought and
received a court order, pursuant to 18 U.S.C. § 2703(d) (2006)
(§ 2703[d] order), for the historical cell site location
10
information (CSLI)9 and other cellular telephone account
information for several cellular telephone numbers that were in
contact with Thomas's cellular telephone on July 25, 2011, the
day of the murder. Under the authority of the § 2703(d) order,
the Commonwealth obtained Fulgiam's CSLI for the period from
July 20, 2011, through July 30, 2011.
A review of the CSLI associated with Fulgiam's cellular
telephone number revealed that on the evening of July 25, 2011,
Fulgiam's cellular telephone activated a cell tower located at
an address which is located directly behind the victim's
apartment, six times between 11:30 P.M. and 11:55 P.M. The last
time Fulgiam's cellular telephone activated the cell tower at
that location was the same time that the neighbors awoke to
gunshots and two minutes before one of them telephoned 911 the
first time.
Fulgiam argues that the Commonwealth improperly obtained
the CSLI for his cellular telephone without probable cause and
that, in any event, the application for the § 2703(d) order was
9
"[CSLI] 'refers to a cellular telephone service record or
records that contain information identifying the base station
towers and sectors that receive transmissions from a [cellular]
telephone.'" Commonwealth v. Estabrook, 472 Mass. 852, 853 n.2
(2015), quoting Commonwealth v. Augustine, 467 Mass. 230, 231
n.1 (2014) (Augustine I), S.C., 470 Mass. 837 and 472 Mass. 448
(2015). "'Historical' CSLI refers to CSLI relating to and
generated by cellular telephone use that has already occurred at
the time of the order authorizing the disclosure of such data."
Augustine I, supra.
11
insufficient to show that his CSLI would be "relevant and
material to an ongoing criminal investigation."10 18 U.S.C.
§ 2703(d). We disagree.
i. Standard of review. In Commonwealth v. Augustine, 467
Mass. 230, 232 (2014) (Augustine I), S.C., 470 Mass. 837 (2015),
we concluded that government-compelled production of CSLI by
cellular telephone service providers was a search in the
10
Fulgiam also argues that the Commonwealth relied on
information obtained by an invalid administrative subpoena
issued on August 4, 2011, pursuant to G. L. c. 271, § 17B, to
support its August 15, 2011, application for a § 2703(d) order.
We agree that this administrative subpoena was of questionable
validity where it was signed on behalf of the assistant district
attorney by an administrative assistant. Section 17B requires
strict compliance with the provision that such administrative
subpoenas are issued by attorneys general or district attorneys.
See Commonwealth v. Feodoroff, 43 Mass. App. Ct. 725, 727 (1997)
(common-law exception to § 17B's requirement, which allows
assistant attorneys general and assistant district attorneys to
sign such subpoenas). However, the information that the
Commonwealth obtained pursuant to the August 4 subpoena did not
prejudice Fulgiam. See id. at 728. By August 8, 2011, the
police already had connected Fulgiam to his cellular telephone
account when Fulgiam met with detectives and provided his
cellular telephone number to them. Based on this knowledge, the
police were able to connect Fulgiam's cellular telephone number
to the stolen cellular telephone, as the police already had the
call detail records for that account. The only information that
the police were able to obtain through the August 4 subpoena
that was not already in their possession was the fact that
Fulgiam's cellular telephone had contact with Corbin's cellular
telephone on July 25, 2011. However, even without the
connection to Corbin, the Commonwealth's application for a
§ 2703(d) order contained sufficient facts showing that
Fulgiam's cellular telephone information would be relevant and
material to the ongoing criminal investigation. Consequently,
the information the Commonwealth obtained from Fulgiam's
cellular telephone account from the August 4 subpoena did not
create a substantial likelihood of a miscarriage of justice.
12
constitutional sense, requiring a warrant under art. 14 of the
Massachusetts Declaration of Rights. We determined, however,
that the warrant requirement was a "new" rule applicable only to
those cases where the defendant raised the warrant issue before
or during the trial and the defendant's conviction was not final
at the time that Augustine I was decided. See id. at 257.
Although Fulgiam's case was on direct appeal when Augustine I
was decided, he did not challenge the sufficiency of the
§ 2703(d) order as a basis for access to his CSLI either before
or during the trial. Therefore, we review to determine "whether
the unobjected-to admission of the CSLI evidence that was
obtained without a search warrant created a substantial
likelihood of a miscarriage of justice." Commonwealth v. Broom,
474 Mass. 486, 493 (2016).
ii. Analysis. Because Fulgiam does not have the benefit
of Augustine I, the Commonwealth only had to meet the standard
set forth in § 2703(d) in order to obtain Fulgiam's CSLI. See
Broom, 474 Mass. at 492. Section 2703(d) requires that an order
"shall issue only if the governmental entity offers specific and
articulable facts showing that there are reasonable grounds to
believe that the contents of a wire or electronic communication,
or the records or other information sought, are relevant and
material to an ongoing criminal investigation." The
Commonwealth met that burden.
13
The application recited the following facts that, taken
together, established reasonable grounds to believe that
Fulgiam's CSLI was "relevant and material" to the ongoing
investigation into the Thomas and Kee murders. First, based on
the review of Thomas's cellular telephone records, the police
were aware that Thomas's cellular telephone was involved in an
ongoing text message dialog with the stolen cellular telephone
between 11:05 P.M. and 11:32 P.M. on the night of the murders
and that the stolen cellular telephone was in contact with
Fulgiam's cellular telephone twice that day. Fulgiam's last
communication with the stolen cellular telephone was a text
message sent at 11:37 P.M., at or near the time of the murders.
At 11:57 P.M., shortly after this last contact between Fulgiam's
cellular telephone and the stolen cellular telephone, the police
received the first 911 call for a disturbance at the victims'
apartment. Second, Fulgiam had admitted to police that he knew
Thomas and that they were in the drug business together. Based
on the affiant's training and experience, that business
connection, the lack of forced entry into the apartment
(suggesting that the victims knew the assailants), and the
ransacked condition of the crime scene placed Fulgiam's cellular
telephone records squarely within the realm of information
"relevant and material" to the ongoing investigation into the
murder of the victims. Thus, Fulgiam cannot demonstrate that
14
the § 2703(d) order was invalid and that as a consequence, the
Commonwealth's access to his CSLI created a substantial
likelihood of a miscarriage of justice. See Broom, 474 Mass. at
493.
b. Corbin's claims. Using the § 2703(d) order issued on
August 15, the Commonwealth obtained Corbin's cellular telephone
subscriber and call detail information, CSLI, and text messages
for the period from July 20 through July 30, 2011. Corbin, like
Fulgiam, did not challenge the Commonwealth's access to these
records either before or during the trial. On appeal, however,
Corbin argues that the Commonwealth's access to and use of these
records at trial was unlawful on statutory and constitutional
grounds, and that his trial counsel was constitutionally
ineffective in failing to file a motion to suppress the records.
More specifically, Corbin claims that (1) the application for
the § 2703(d) order (§ 2703[d] application) failed to make the
required showing that the records were "relevant and material"
to an ongoing criminal investigation; and (2) the access to and
use of the content of his text messages at trial was improper
because the § 2703(d) application failed to establish probable
cause to believe "that a particularly described offense has
been, is being, or is about to be committed, and that [the
content of the text messages being sought] will produce evidence
of such offense or will aid in the apprehension of a person who
15
the applicant has probable cause to believe has committed, is
committing, or is about to commit such offense" as required by
18 U.S.C. § 2703(a) and art 14.11 Augustine I, 467 Mass. at 256,
quoting Commonwealth v. Connolly, 454 Mass. 808, 825 (2009).
These claims fail.
i. Standard of review. Where, as here, the defendant has
been convicted of murder in the first degree, we review his
claim of ineffective assistance of counsel to determine whether
the alleged lapse created a "substantial likelihood of a
miscarriage of justice," a standard more favorable to the
defendant than the constitutional standard otherwise applied
under Commonwealth v. Saferian, 366 Mass. 89, 96 (1974).
Commonwealth v. Wright, 411 Mass. 678, 681-682 (1992), S.C., 469
Mass. 447 (2014). We focus more broadly on whether there was
error and, if so, whether any such error "was likely to have
influenced the jury's conclusion." Id. If the defendant's
claim of ineffective assistance of counsel is based on the
failure to file a motion to suppress, he must "show that the
motion to suppress would have been successful, and that failing
to bring such a motion . . . created a substantial likelihood of
a miscarriage of justice." Commonwealth v. Banville, 457 Mass.
530, 534 (2010).
11
Corbin does not challenge the use of his cellular
telephone CSLI at trial.
16
If the failure to file a motion to suppress resulted from
counsel's tactical decision not to do so, the defendant must
demonstrate that this strategic choice was "manifestly
unreasonable" when made (quotations and citation omitted).
Commonwealth v. Kolenovic, 471 Mass. 664, 674 (2015). Here,
however, the record is unclear as to whether counsel's decision
was tactical, as the defendant did not file a motion for new
trial on this ground, clarifying the record on trial counsel's
reason for his choice.
ii. Likelihood of success on the motion to suppress.
Because the analysis of the likelihood of success on a motion to
suppress the subscriber and call detail information is governed
by a legal standard that is different from that applicable to
text messages, we consider each category of information
separately.
A. Subscriber and call detail information. To secure a
§ 2703(d) order allowing access to subscriber and call detail
information, the application must establish "specific and
articulable facts showing that there are reasonable grounds to
believe that the [information sought is] relevant and material
to an ongoing criminal investigation." 18 U.S.C. § 2703(d).
Corbin argues that the Commonwealth's application was
insufficient to meet this test. We disagree.
17
The § 2703(d) application, reciting a series of calls and
text messages between Thomas and Corbin on the day of the
murders,12 was more than sufficient to establish that Corbin's
subscriber and call detail information was "relevant and
material" to the investigation into the murders of Thomas and
Kee. Id. The application included information that (1) Thomas
and Corbin personally knew one another; (2) there appeared to be
no forced entry at the crime scene, suggesting the victims knew
the assailants; (3) the crime scene had been ransacked and,
based on the affiant's training and experience, the murders
appeared to be a result of a drug robbery; (4) drug dealers tend
to communicate via cellular telephone to coordinate drug
purchases; and (5) on the day of the murders, Corbin's cellular
telephone number had multiple telephonic communications,
including text messages, with both Fulgiam and Thomas. Given
these facts, a motion to suppress on this ground was
demonstrably lacking in merit. Thus, Corbin has failed to meet
his burden to establish that the failure to file a motion to
suppress the use of the subscriber and call detail information
created a substantial likelihood of a miscarriage of justice.
12
After securing Thomas's cellular telephone records, the
police focused their investigation on the calls to and from
Thomas's cellular telephone. The Commonwealth had associated
Corbin with his cellular telephone account prior to its
§ 2703(d) application and used such information in the
application.
18
B. Text messages. Corbin argues that counsel was
ineffective in failing to file a motion to suppress the content
of the text messages where the Commonwealth obtained access
without a warrant under 18 U.S.C. § 2073(a) and art. 14. We
agree that, on both statutory and constitutional grounds, a
warrant was required to obtain access to the content of Corbin's
text messages and that a motion to suppress challenging the
Commonwealth's access on these grounds likely would have been
successful.
I. Warrant requirement for access under § 2703(a). Access
to the "contents of wire or electronic communications in
electronic storage" is governed by 18 U.S.C. § 2703(a), which
provides that "[a] governmental entity may require the
disclosure by a provider of electronic communication service[13]
of the contents of a wire or electronic communication, that is
in electronic storage in an electronic communications system for
one hundred and eighty days or less only pursuant to a warrant
. . . (in the case of a State court, using State warrant
procedures) by a court of competent jurisdiction" (emphases
supplied). Because it is undisputed that Corbin's "electronic
communications" (text messages) met the temporal requirement of
13
The Stored Communications Act, 18 U.S.C. §§ 2701-2712
(2006), defines an electronic communication service as "any
service which provides users thereof the ability to send or
receive wire or electronic communications." 18 U.S.C.
§ 2510(15) (2006). See 18 U.S.C. § 2711.
19
§ 2703(a), the dispositive issue is whether this content was
held in "electronic storage" by "a provider of electronic
communication service." Id.
The Commonwealth argues that the warrant requirement of
§ 2703(a) does not apply to Corbin because text messages are
held by a provider of a "remote computing service"14 rather than
an "electronic communication service" and that, as a
consequence, access may be obtained without a warrant under
§ 2703(b). We reject the Commonwealth's argument because we
agree with the defendant that the text messages at issue here
were held by a provider of an "electronic communication service"
for less than 180 days, which triggered the warrant
requirement.15
14
A "remote computing service" is defined as "the provision
to the public of computer storage or processing services by
means of an electronic communications system." 18 U.S.C.
§ 2711(2) (2006). In practice, this phrase is understood to
refer to the use of "remote computers [to] store extra files or
process large amounts of data" by commercial customers. See
Kerr, A User's Guide to the Stored Communications Act, and a
Legislator's Guide to Amending It, 72 Geo. Wash. L. Rev. 1208,
1213-1214 (2004).
15
General Laws c. 271, § 17B, is the analog to 18 U.S.C.
§ 2703(a), which treats the government's access to the content
of electronic communications in a different manner from
noncontent information. Both laws demand a higher standard of
proof, beyond "relevant and material to an ongoing criminal
investigation," 18 U.S.C. § 2703(d), to access the content of
electronic communications. Compare 18 U.S.C. § 2703(a)
(allowing access to content of electronic communications stored
in electronic communications service for 180 days or less only
pursuant to warrant), with G. L. c. 271, § 17B (specifically
20
Although the Supreme Court has not defined "electronic
communication service" as used in § 2703(a), we adopt the
approach in Quon v. Arch Wireless Operating Co., 529 F.3d 892
(9th Cir. 2008), overruled on other grounds sub nom. City of
Ontario, Cal. v. Quon, 560 U.S. 756 (2010), where the court's
analysis focused on the actual services offered to the consumer
to determine whether the entity is a provider of "electronic
communication service" or "remote computing service." See id.
at 900, 901. Relying on the plain language of the statute, the
Quon court concluded that the definition of "electronic
communications service" as "any service which provides users . .
. the ability to send or receive wire or electronic
communications[,]" 18 U.S.C. § 2510(15) (2006), applied "[o]n
its face" to the text messaging service at issue in that case.
Id. at 901. That same logic applies here to the text message
service provided by Corbin's cellular telephone carrier.
This interpretation is consistent with the heightened
protection for the content of electronic communications. In
Riley v. California, 134 S. Ct. 2473 (2014), the United States
Supreme Court held that police officers must secure a search
warrant prior to searching a cellular telephone, as modern
cellular telephones contain "vast quantities of [digital]
excluding access to content of electronic communications from
statute).
21
personal information." Id. at 2485. See United States v.
Warshak, 631 F.3d 266, 286 (6th Cir. 2010) (electronic mail
messages "require[] strong protection under the Fourth
Amendment; otherwise, the Fourth Amendment would prove an
ineffective guardian of private communication, an essential
purpose it has long been recognized to serve"). A search of the
content of text messages implicates similar privacy interests.
Just as the government may not intercept private telephone calls
or written communications without a warrant, we conclude that
the Commonwealth may not obtain the content of text messages
without a warrant. See United States v. Jacobsen, 466 U.S. 109,
114 (1984) (warrantless searches of letters and other sealed
packages is presumptively unreasonable); Katz v. United States,
389 U.S. 347, 361 (1967) (Harlan, J., concurring).
II. Warrant requirement under art. 14. Because the United
States Supreme Court has yet to decide whether access to the
content of text messages requires compliance with the warrant
requirement of § 2703(a), we consider the issue under art. 14,
as articulated in Augustine I. We conclude that a warrant was
required to obtain access to the content of Corbin's text
messages. Access to the content of a text message constitutes a
search requiring a showing of probable cause which in this
context means "probable cause to believe 'that the particularly
described offense has been, is being, or is about to be
22
committed, and that [the text message content being sought] will
produce evidence of such offense or will aid in the apprehension
of a person who the applicant has probable cause to believe has
committed, is committing, or is about to commit such offense.'"
Augustine I, 467 Mass. at 256, quoting Connolly, 454 Mass. at
825.
A warrant with probable cause was required because Corbin
had a reasonable expectation of privacy in the content of his
text messages. "The measure of the defendant's [reasonable]
expectation of privacy is (1) whether the defendant has
manifested a subjective expectation of privacy in the object of
the search, and (2) whether society is willing to recognize that
expectation as reasonable." Commonwealth v. Montanez, 410 Mass.
290, 301 (1991). See Katz, 389 U.S. at 361 (Harlan, J.,
concurring). As the Commonwealth notes, the defendant did not
file a motion for a new trial or a motion to suppress, and for
that reason, the judge did not hold an evidentiary hearing to
determine whether Corbin had a subjective expectation of privacy
in the contents of the text messages from the 2898 number. The
record, however, establishes that Corbin had a subjective
expectation of privacy in the content of his text messages. See
Montanez, supra at 301.
As mentioned above, Corbin provided the police with his
cellular telephone number prior to his arrest. At trial he
23
offered the CSLI associated with the cellular telephone account
as evidence that he was not in Hyde Park on July 25, 2011,
implicitly claiming ownership of the cellular telephone account;
and the cellular telephone associated with the 2898 number was
seized from Corbin pursuant to a search warrant prior to his
arrest. Moreover, the Commonwealth consistently attributed the
cellular telephone account to Corbin. See Commonwealth v.
Augustine, 472 Mass. 448, 452 n.6 (2015) (Augustine II)
(cellular telephone owned by another treated as belonging to
defendant where he paid bills and used it exclusively). To be
sure, the fact that a defendant's name is not listed as the
subscriber of the account could diminish his subjective
expectation of privacy. However, on the facts of this case,
Corbin's implicit acknowledgment of ownership satisfied his
burden. See Commonwealth v. Genest, 371 Mass. 834, 836 (1977)
(defendant has burden to show reasonable expectation of
privacy).
Similarly, Corbin had an objectively reasonable expectation
of privacy in his text messages. In Augustine I, 467 Mass. at
255, we recognized an objectively reasonable expectation of
privacy in a defendant's CSLI records. We further stated "that
the nature of cellular telephone technology and CSLI and the
character of cellular telephone use in our current society
render the third-party doctrine of [United States v.] Miller[,
24
425 U.S. 435 (1976),] and Smith [v. Maryland, 442 U.S. 735
(1979),] inapposite." Augustine I, supra at 245. The same
result applies here with respect to the content of text messages
stored on a cellular telephone service provider's servers.
Because we conclude that probable cause was required to
obtain the content of Corbin's text messages, we next consider
whether the application established the requisite probable cause
for access to Corbin's text messages. See id at 256.
The application established a personal relationship between
Thomas and Corbin, that Corbin was in telephonic contact with
both Thomas and Fulgiam on the day of the murders, and that the
circumstances of the murders suggested a connection to drugs.
Although the fact that Thomas and Corbin may have used their
cellular telephones to communicate with each other on the day of
the murders elevated their relationship to a matter of
importance in the investigation, it did not, without more,
justify intrusion into the content of that communication.16 In
16
On July 25, 2011, between 2:15 P.M. and 7:27 P.M., Corbin
and Thomas exchanged the following text messages:
Thomas: "What hapnd bro i need that"
"I need 2 c u like yesterday i have 2 get a whip manana n i
def need that bread i would appreciate if u didnt hold me
up"
"This is what i didnt want 2 happen we discussed this b4
bro straightn me first remember dnt make it bad bro"
25
contrast to Fulgiam, nothing in the application indicated a drug
connection between Corbin and Thomas, such that Corbin might
have a motive for murder. Other than the cellular telephone
communication between Thomas and Corbin, the application failed
to recite any facts that might have implicated Corbin in the
crimes or suggested that the content of his text messages would
aid in the apprehension of a suspect in the murders. See
Augustine I, 467 Mass. at 256. Given these shortcomings in the
application, we conclude that the Commonwealth failed to
establish the requisite probable cause and, therefore,
improperly obtained the content of Corbin's text messages.
The Commonwealth argues that, in any event, Corbin lacked
standing to challenge the access to the content of the text
messages because the cellular telephone account was held under a
Corbin: "Bro u know i do what i can 2 get u first but i
called u. I cant hold these niggers up."
Thomas: "n my bread u feel me wit out me it neva would
have been there 2 flip anything"
"U cant hold anyone up when its not there bread thats free
money i should have mine off the top than play with urs not
mine bro we talkd about this ur flip"
Corbin: "I see u going through some thing cause we never
kicked it like this. im going 2 put as much 2gether 4 u
not in 2 long"
Thomas: "Good look lol naw cause someone did somethng
simular just cause i say im somewhre u cant assumd my
schedule or do ur own thng thats all im tryna say talk"
"2 you when u come bro"
26
fictitious name or held by someone other than Corbin. "A
defendant has standing either if [he] has a possessory interest
in the place searched or in the property seized or if [he] was
present when the search occurred." Commonwealth v. Williams,
453 Mass. 203, 208 (2009). The Commonwealth argues that the
defendant has not made the requisite showing that he had a
possessory interest in the cellular telephone account for the
2898 number because Corbin did not move for a new trial and file
an affidavit averring such a possessory interest in the account,
or present any affirmative evidence showing such an interest.
However, the Commonwealth consistently has asserted that the
listed account holder for the 2898 number was Corbin. In its
§ 2703(d) application, the Commonwealth associated the 2898
number with Corbin. Throughout the trial the Commonwealth
asserted that Corbin sent the text messages it offered in
evidence, and it offered Corbin's CSLI to show that there was no
activity on his cellular telephone during the murders.
Moreover, a detective testified that another detective was in
telephonic contact with Corbin using the 2898 number. Finally,
the cellular telephone associated with the 2898 number was
seized from Corbin and searched pursuant to search warrant.17
17
The Commonwealth obtained Corbin's cellular telephone
pursuant to a search warrant on October 27, 2011; however, it
previously had obtained the content of his text messages
pursuant to its August 15 § 2703(d) application.
27
Given these facts, Corbin has standing to challenge the
warrantless search of the content of the text messages sent from
the 2898 number.18 See Williams, supra at 208.
Last, we reject the Commonwealth's argument that customers
of cellular service providers such as Metro PCS, which are
advance-pay services, assume the risk that the content of
information stored on its servers will be disclosed to third
parties. To support its argument, the Commonwealth notes that
companies such as Metro PCS do not conduct credit checks or
verify the identity of its customers, and that as a consequence,
customers who engage the services of such companies have a less
objectively reasonable expectation of privacy. In determining a
subscriber's reasonable expectation of privacy, we decline to
distinguish between those who choose not to submit to a credit
check, or do not have credit, or are not the named account
18
Corbin established standing here, in part, through his
implicit acknowledgment of ownership of the cellular telephone
account associated with the 2898 number, prior to and during
trial. We note that a defendant, connected to a cellular
telephone account with a cellular telephone service provider
under an assumed name, will not automatically have standing to
challenge the search of the information relating to the cellular
telephone account. Such a defendant, as here, must establish
both standing and a reasonable expectation of privacy in order
to challenge such a search. See Commonwealth v. Williams, 453
Mass. 203, 207-208 (2009). Additionally, we acknowledge that
the posture of this case made the determination of standing and
reasonable expectation of privacy more difficult. The better
practice is to assert this claim through a motion for a new
trial and present affirmative evidence to support a defendant's
entitlement to challenge such a search.
28
holder on a cellular telephone account and those customers who
identify themselves or have established credit.
iii. Substantial likelihood of a miscarriage of justice.
We now ask whether the admission of the text messages, which
could have been suppressed, created a substantial likelihood of
a miscarriage of justice and "likely . . . influenced the jury's
conclusion." Williams, 453 Mass. at 205, quoting Wright, 411
Mass. at 682. We conclude that it did not.
Corbin's defense was that he was innocent and that Thomas,
as a high level drug dealer, was in a dangerous business.
Corbin claimed that many people knew Thomas was a drug dealer
and, for that reason, he was a target for drug robbery.
Corbin's argument that the content of his text messages was the
only evidence from which the jury could find a motive and
opportunity for Corbin to commit the murders is belied by the
record. Much of the information about Thomas's status as a high
level drug dealer came in through other evidence.19
In addition, based on evidence wholly independent of the
text messages, Corbin's involvement in the murders was not a
19
Thomas's best friend testified that Thomas was selling "a
few thousand dollars" worth of marijuana per week and
approximately $4,000 or $5,000 worth of cocaine per week.
Additionally, that friend testified that it was common in the
drug business for a higher level dealer to supply drugs to
"street-level" dealers for sale, and the jury heard evidence
that Fulgiam admitted to being in the drug business with Thomas
and that Thomas had a lot more money than Fulgiam.
29
close question. The discovery of Corbin's fingerprint on the
barrel of the curling iron found near Kee's body was highly
inculpatory, as was the evidence of Corbin's telephonic contact
with Fulgiam, Thomas, and the stolen cellular telephone on the
day of the murders. The inference that Corbin was in possession
of the cellular telephone stolen a few hours before the murders,
and that he used this telephone to contact Thomas on multiple
occasions, including within two hours of the murders, also was
highly inculpatory. The jury also heard evidence that Thomas,
Corbin, and Fulgiam were involved in the drug business together
and that the murders were likely connected to a drug robbery.
Moreover, although we recognize that trial counsel was faced
with the task of downplaying the impact of the text messages
once they were admitted in evidence, he affirmatively used this
content in his closing argument to establish that (1) Thomas had
a significant amount of drugs and money in his apartment most of
the time; (2) Thomas was a "tempting" target for robbery; and
(3) the nature of Thomas's business was such that persons other
than Corbin could have a motive to kill Thomas. Against the
backdrop of this highly incriminating evidence, we cannot say
that the jury's exposure to Corbin's text messages likely
influenced the jury's verdict. Therefore, Corbin cannot meet
his burden to establish that trial counsel's failure to file a
30
motion to suppress the content of his text messages created a
substantial likelihood of a miscarriage of justice.
2. Fingerprint analysis. The Commonwealth presented the
following evidence to prove its contention that the fingerprint
analysis placed both defendants at the scene of the crime during
the murders. Although police criminalists were able to obtain
several latent fingerprints20 from items at the scene,
ultimately, only five latent prints were individualized21 to
defendants. Four latent prints were recovered from the magazine
of the nine millimeter semiautomatic pistol, and one thumbprint
was recovered from the barrel of the curling iron found near
Kee's body.
During her testimony, a fingerprint analyst explained that
latent print analysts compare the latent prints recovered from
crime scenes to known prints, i.e., fingerprint impressions
taken in a controlled setting, either in ink or on a scanner.
Insofar as relevant here, police produced a card, known as a
"ten-print" card, which includes the ten fingerprint
20
A latent print is "a fingerprint that generally can't be
seen right away, and [one] would need further processing in
order for it to be seen."
21
Individualization is "when a latent print examiner comes
to a conclusion that there is a sufficient amount of detail of
quality and quantity of those details between the latent print
and the known fingerprint to arrive at that conclusion, to
establish that the latent print originated from the known print
or that donor."
31
impressions, the name of the person who is being fingerprinted,
typically a signature of that person, and other identifying
information, such as date of birth and address. Police latent
print analysts access the known prints through certain
databases. The latent print analysts use a method known as
analysis, comparison, evaluation, and verification, or ACE-V, to
compare the latent prints recovered to known prints.
With respect to Corbin's fingerprint, the analyst explained
that she began by using the ACE-V methodology to determine that
the latent print had sufficient quality and quantity of detail
for comparison purposes. Next, she obtained possible matches
through a fingerprint database, including the ten-print card of
Corbin that was maintained by the State police and created on
July 7, 2005.22 Finally, after performing the ACE-V methodology
again, the analyst "individualized the right thumb" of Corbin to
the latent print recovered from the curling iron.
With respect to Fulgiam's fingerprints, four of seven
latent fingerprints that were recovered from the magazine of the
nine millimeter semiautomatic pistol were individualized to him.
The analyst explained, over objection, that she generated the
Fulgiam's known ten-print card, maintained by the State police
and created on July 18, 2011, for comparison with the recovered
22
Corbin's ten-print card was admitted in evidence over
objection.
32
latent prints.23 Next, applying the ACE-V methodology, she
individualized the four latent prints to Fulgiam.
a. Ten-print cards. The defendants argue that the judge
erred in admitting the ten-print cards under the business
records exception to the hearsay rule. See G. L. c. 233, § 78;
Mass. G. Evid. § 803(6)(A) & note (2017). More specifically,
the defendants argue that because the statements underlying the
ten-print card were made by persons having no business duty to
report the information accurately, the statements fall outside
the scope of the business records exception to the hearsay rule.
We disagree.
The business records exception to the hearsay rule
provides, in relevant part: "a writing or record, . . . made as
a memorandum or record of any act, transaction, occurrence or
event, shall not be inadmissible in any civil or criminal
proceeding as evidence of the facts therein stated because it is
transcribed or because it is hearsay or self-serving." G. L.
c. 233, § 78. A record falls within the scope of the business
records exception to the hearsay rule, set forth in § 78, "if
the judge finds that it was (1) made in good faith; (2) made in
the regular course of business; (3) made before the action
23
As discussed infra, both Corbin and Fulgiam vigorously
contested the assertion that the ten-print cards associated with
them actually contained their fingerprints because the ten-print
cards lacked certain identifying information, including both
Corbin and Fulgiam's signatures.
33
began; and (4) the regular course of business to make the record
at or about the time of the transaction or occurrences
recorded." Beal Bank, SSB v. Eurich, 444 Mass. 813, 815 (2005),
citing DiMarzi v. American Mut. Ins. Co., 389 Mass. 85, 105
(1983). If such findings are made, the record "is presumed to
be reliable and therefore admissible." Wingate v. Emery Air
Freight Corp., 385 Mass. 402, 406 (1982).
This presumption, however, does not automatically extend to
the out-of-court statements made by a secondary source that the
record preparer relies on when creating the record. The
essential element underlying the presumption of reliability is
the theory that "entries in these records are routinely made by
those charged with the responsibility of making accurate entries
and are relied on in the course of doing business." Id. Where
the person providing information to the preparer is unconnected
to the business, and thus is under no business duty to provide
accurate information, this essential element is lost. Although
§ 78 provides that preparer's personal knowledge (or lack
thereof) goes to the record's weight, not its admissibility,
this provision does not negate the requirement that, where the
information contained within the record is offered for its
truth, the source from which the preparer obtained the
information "must carry the same indicia of reliability, arising
34
from regularity and business motives, that bring his own act of
recording the information within the statutory exception." Id.
To demonstrate that the preparer's hearsay source bears the
same indicia of reliability as the preparer, the proponent need
not produce each speaker. Beal Bank, SSB, 444 Mass. at 816.
Rather, the proponent need only present evidence demonstrating
that the hearsay source "reported the information as a matter of
business duty or business routine." Wingate, 385 Mass. at 406.
Such was the case in Beal Bank, SSB, where the proponent bank
introduced, as its own business record, a printout of a report
produced and provided to it by the bank's loan servicing agent
(agent). Beal Bank SSB, supra at 816. In determining that the
judge did not abuse his discretion in admitting the document as
a business record, we noted that because the agent serviced the
bank's loans pursuant to a contract, the bank manager's
testimony regarding the records was sufficient to support the
admission of the documents. Id. at 817. Key to this
determination was the existence of a business relationship
between the bank and it agent. We noted, "this is not a case
where the bank is simply receiving information from another
business. Rather, [the agent] is the bank's servicing agent; it
has a business duty [to accurately report] the information to
the bank; and the bank routinely accesses and relies on that
information." Id.
35
In this case, the Commonwealth introduced two ten-print
cards created by the State police, each of which bore ten
fingerprints and identifying information associated with the
defendants.24 As a threshold matter, we determine that the ten-
print cards meet the statutory requirements under the business
records exception.25 The admissibility of the identifying
information provided by the persons being fingerprinted and
reflected on the ten-print card, however, is not so easily
established. Unlike in Beal Bank, SSB, here, the persons being
fingerprinted had neither a contractual obligation nor a
business duty to provide accurate and reliable identifying
information. Thus, the protections that "arise[] from
regularity and business motives," Wingate, 385 Mass. at 406,
are inapplicable here.
24
Specifically, one of the ten-print cards reflected
Corbin's name, aliases, date of birth, sex, race, place of
birth, height, weight, eye and hair color, and Social Security
number. The other reflected Fulgiam's name, date of birth, sex,
race, place of birth, height, weight, and eye and hair color.
Neither ten-print card reflected the signature of the person
fingerprinted, although the ten-print card provides space for
such information.
25
The Commonwealth's witness, a State police trooper,
testified that the ten-print records were maintained in the
State police's identification unit, located in Sudbury, and
confirmed that such records were typically produced, entered,
and maintained for administrative purposes in good faith, in the
ordinary course of business of the State police. The trooper
also confirmed that the ten-print cards were created prior to
the commencement of the case.
36
Here, the officer who creates the ten-print card has a duty
to ensure that the person who is being fingerprinted is
accurately identified. Otherwise, such cards would have little
value to law enforcement. Moreover, G. L. c. 268, § 34A,
states: "[w]hoever knowingly and willfully furnishes a false
name or Social Security number to a law enforcement officer or
law enforcement official following an arrest shall be punished
by a fine or not more than $1,000 or by imprisonment in a house
of correction for not more than one year or by both such fine
and imprisonment." Therefore, based on the officers' duty to
ensure the ten-print cards are created with accurate
information, and the arrestees' legal obligation to provide
accurate information, we conclude that the identifying
information on the cards is reliable and brings the identifying
evidence reflected on the ten-print card within the scope of the
business records exception to the hearsay rule. See Wingate,
385 Mass. at 406.
The defendants argue that the ten-print cards do not fall
within the scope of the business records exception to the
hearsay rule because the Commonwealth failed to present evidence
that the person taking the fingerprints verified the identities
of the persons fingerprinted. See United States v. Vigneau, 187
F.3d 70, 77 (1st Cir. 1999), cert. denied, 528 U.S. 1172 (2000)
(admission of sender's name, address, and telephone number
37
reflected on Western Union "To Send Money" form for truth was
error where Western Union did not have practice of verifying
such information). Although we agree that verification may be a
best practice, we conclude that the presence or absence of
independent verification bears on the weight of the record
rather than its admissibility under the business records
exception. In addition, the defendants point out that important
information, including signatures of the person taking the
fingerprints, and signatures of the persons being fingerprinted
are missing. These issues also go to the weight, which may be
subject to intense scrutiny on cross-examination, rather than
the admissibility of the evidence.
We are also not persuaded by Corbin's argument that the
ten-print cards were inadmissible because the Commonwealth
presented testimony from a witness who did not actually take or
maintain the ten-print cards. Section 78 makes clear, as has
this court, that the admissibility of a document under the
business records exception does not turn on the personal
knowledge of the record's preparer. See Wingate, 385 Mass. at
406, quoting G. L. c. 233, § 78 ("'personal knowledge by the
entrant or maker' is a matter affecting the weight [rather than
the admissibility] of the record"). Accordingly, we conclude
38
that the ten-print were properly admitted under the business
records exception to the hearsay rule.26
Last, the defendants argue that the admission of the ten-
print cards violated the right of confrontation as guaranteed by
the Sixth Amendment to the United States Constitution and art.
12 of the Massachusetts Declaration of Rights. We disagree.
The Supreme Court of the United States has made clear that the
confrontation clause "guarantees a defendant the opportunity to
confront any person, in the 'crucible of cross examination,'
whose 'testimonial' statements are introduced against him."
Commonwealth v. Siny Van Tran, 460 Mass. 535, 552 (2011),
quoting Crawford v. Washington, 541 U.S. 36, 51-52, 61 (2004).
Similarly, art. 12 "commands that 'every subject shall have a
right . . . to meet the witnesses against him face to face.'"
Commonwealth v. Amirault, 424 Mass. 618, 628 (1997), quoting
art. 12. "It is the testimonial character of any item of
evidence that triggers the confrontation right, notwithstanding
its admissibility under statute, State rule, or a common-law
hearsay exception." Siny Van Tran, 460 Mass. at 552, citing
Melendez-Diaz v. Massachusetts, 557 U.S. 305, 323 (2009).
However, "[m]ost of the hearsay exceptions covered statements
26
Because of our conclusion, we need not address Corbin's
argument that trial counsel's failure to object to the validity
of the ten-print card constituted ineffective assistance of
counsel.
39
that by their nature were not testimonial -- for example,
business records or statements in furtherance of a conspiracy."
Melendez-Diaz, 557 U.S. at 324, citing Crawford, 541 U.S. at 56.
The Court clarified, "[b]usiness and public records are
generally admissible absent confrontation not because they
qualify under an exception to the hearsay rules, but because --
having been created for the administration of an entity's
affairs and not for the purpose of establishing or proving some
fact at trial -- they are not testimonial." Melendez-Diaz,
supra.
Fingerprint records are nontestimonial because they are
created for the "administration of an entity's affairs" rather
than to establish or prove some fact at trial. Commonwealth v.
Weeks, 77 Mass. App. Ct. 1, 5 (2010). See Melendez-Diaz, 557
U.S. at 324. Here, the trooper testified that ten-print cards
are created in the ordinary course of business in good faith,
and Corbin and Fulgiam's ten-print cards were created prior to
the commencement of the trial. The ten-print cards were
business records under G. L. c. 233, § 78. Because the ten-
print cards are business records, we conclude that the admission
of the ten-print cards did not violate the defendants' right to
confront witnesses against them protected by the Sixth Amendment
and art. 12.
40
b. Testimony of fingerprint analyst. The defendants
challenge the admission of the Commonwealth's fingerprint expert
witness testimony on several grounds. The defendants first
argue that the Commonwealth's expert witness improperly
testified to the result of her fingerprint analysis in absolute
terms, stating that she had individualized the defendants'
fingerprints to prints found at the scene of the crime.
According to the defendants, the introduction of expert
fingerprint testimony stating the results of fingerprint
analysis in absolute terms is inconsistent with recent science
questioning the accuracy and reliability of fingerprint analysis
and the ACE-V methodology. Because the defendants did not
object to this aspect of the testimony at trial, our inquiry is
whether any error created a substantial likelihood of a
miscarriage of justice. Wright, 411 Mass. at 682.
We have on several occasions addressed the issue of the
ACE-V methodology and expert testimony based on it. See, e.g.,
Commonwealth v. Gambora, 457 Mass. 715, 724-728 (2010), and
Commonwealth v. Patterson, 445 Mass. 626, 641-655 (2005). In
Gambora, supra at 724, we discussed in great depth a 2009 report
published by the National Research Council for the National
Academy of Sciences (NAS Report), which raised several issues
regarding the reliability of certain aspects of the ACE-V
41
methodology and the expert testimony that relies upon it.27 The
central issue raised in the NAS Report was "the need to prevent
overstatement of the accuracy of fingerprint comparisons, and
for additional research." Commonwealth v. Joyner, 467 Mass.
176, 181 (2014), quoting Gambora, supra at 726. Although we
stated that "courts historically have found fingerprint evidence
to be admissible," Joyner, supra at 180, quoting Patterson, 445
Mass. at 644, we also noted that "[t]estimony to the effect that
a latent print matches, or is 'individualized' to, a known
27
In Gambora we stated:
"The [NAS] report does not appear to question the
underlying theory which grounds fingerprint identification
evidence; as the report states, there is scientific
evidence supporting the theory that fingerprints are unique
to each person and do not change over a person's
life. . . . However, the NAS report adds, '[u]niqueness and
persistence are necessary conditions for friction ridge
identification [i.e., fingerprint identification] to be
feasible, but those conditions do not . . . guarantee that
prints from two different people are always sufficiently
different that they cannot be confused, or that two
impressions made by the same finger will also be
sufficiently similar to be discerned as coming from the
same source'" (citations omitted).
Commonwealth v. Gambora, 457 Mass. 715, 724-725 (2010), citing
National Research Council, Strengthening Forensic Science in the
United States, A Path Forward 143-144 & n.34 (2009) (NAS
Report). Moreover, we stated that although the NAS Report does
not draw the conclusion that fingerprint evidence lacks such
reliability that courts should no longer deem it admissible, the
report does "stress the subjective nature of the judgments that
must be made by the fingerprint examiner at every step of the
ACE-V process, including an examiner's ultimate conclusion that
a latent print is 'individualized' to a specific, identified,
known print." Gambora, supra at 725, citing NAS Report at 139,
141.
42
print, if it is to be offered, should be presented as an
opinion, not a fact, and opinions expressing absolute certainty
about, or the infallibility of, an 'individualization' of a
print should be avoided." Gambora, supra at 729 n.22.
The defendants contend that the fingerprint expert witness
failed to heed this court's cautionary advice and presented her
findings based on her application of the ACE-V methodology to
latent prints found on the scene as fact rather than opinion.
We agree, but we are persuaded that the testimony did not create
a substantial likelihood of a miscarriage of justice. Wright,
411 Mass. at 682.
Fingerprint analysts testifying as expert witnesses must
clearly frame their findings in the form of an opinion to avoid
improper testimony. See Mass. G. Evid. § 702 & note (2017).
See also Joyner, 467 Mass. at 183 n.9 ("Gambora permits a
fingerprint expert to opine on whether two fingerprints match,"
thus it is "helpful" to ask expert to testify as to his or her
opinion). Here, the analyst testified that individualization
signifies that the print examiner has "come[] to the conclusion
that there is a sufficient amount of quality and quantity of
those details between the latent print and the known fingerprint
. . . to establish that the latent [print] originated from the
known print or that donor." She testified on several occasions
43
that she individualized fingerprints of the defendants to latent
prints found at the scene of the crime.
However, portions of the analyst's testimony implicitly
suggested the fallibility of fingerprint analysis. Contrast
Commonwealth v. Wadlington, 467 Mass. 192, 205 (2014)
(fingerprint analyst improperly testified as to her belief of
"no error rate in [her] area of science"). For example, she
agreed that latent prints are obtained from an "uncontrolled
setting," and that various factors, including pressure, can
affect the way the fingerprint is recorded. Moreover, as in
Gambora, we note that the vigorous cross-examination of the
analyst countered any possible misconception that
individualization is infallible. Specifically, defense counsel
for Fulgiam questioned her on her inability to determine when
the latent prints were deposited, and counsel highlighted the
fact that fingerprints are "somewhat delicate." Defense counsel
for Corbin also questioned her on issues regarding the surface
from which the latent print on the curling iron was taken and
regarding the fact that the latent print recovered is not
"exactly similar" to the known prints.
Finally, the Commonwealth's evidence linking the defendants
to the crime, separate and apart from the fingerprint evidence,
was strong. Thus, even though we conclude that the analyst's
testimony regarding individualization was erroneously presented
44
as fact, we determine that the error did not create a
substantial likelihood of a miscarriage of justice.
The defendants also argue that the judge erred in allowing
the analyst to testify that another fingerprint analyst had
reviewed her work.28 According to the defendants, this testimony
amounted to "improper vouching" and hearsay expert testimony.
We are not persuaded that this testimony was error. Expert
testimony as to the opinions or conclusions of a second,
nontestifying expert constitutes inadmissible hearsay. See
Commonwealth v. Whitaker, 460 Mass. 409, 421-422 (2011). Here,
the judge allowed the analyst's testimony that the other analyst
"reviewed" her work, but did not allow testimony that the second
analyst verified her work.29 The analyst testified as to the
ACE-V process, wherein verification or review by another
fingerprint analyst is a step in the process, and did not
testify as to the second analyst's independent conclusions. The
28
During the analyst's testimony, counsel for Fulgiam
preemptively objected to any questioning by the Commonwealth
regarding whether the analyst's findings were verified by
another fingerprint examiner. While the judge sustained the
objection, the judge indicated that the witness would be allowed
to testify that another fingerprint analyst reviewed her work.
29
Despite the judge's ruling prohibiting the Commonwealth
from questioning the analyst regarding whether another analyst
verified her work, following the colloquy, the Commonwealth
questioned whether her work was "verified." After the analyst
testified in the affirmative, Fulgiam objected. The judge
sustained the objection as to the use of the word "verified,"
but reiterated that he would allow the testimony regarding what
the second analyst did when he examined the analyst's findings.
45
analyst's testimony stands in stark contrast to the expert
testimony at issue in Whitaker, where the fingerprint analyst
expert witness testified that two secondary analysts "concurred"
with his conclusions regarding individualization. Id. at 421.
Accordingly, we conclude that the judge did not err in admitting
the fingerprint analyst's testimony confirming that another
fingerprint analyst reviewed her findings.
Nonetheless, judges must use caution in allowing testimony
regarding the verification step in ACE-V analysis, as
"verifying" suggests that a nontestifying expert concurs with
the testifying expert's conclusion. Such testimony would be
improper hearsay testimony. See Commonwealth v. Chappell, 473
Mass. 191, 202 (2015).
3. Gang references. Corbin argues that the Commonwealth
improperly and repeatedly referenced gang affiliation during the
trial, despite the fact that the judge granted Fulgiam's motion
in limine to exclude such references. This argument has no
merit. Corbin merely speculates that the jury would conclude
that the defendants were affiliated with gangs based on the
neighborhoods in which the men grew up.30 Additionally, the
prosecutor's closing argument was proper; there was testimony
30
During their interviews with detectives, Fulgiam and
Corbin told the detectives that Fulgiam was originally from the
Academy Homes Development in the Roxbury section of Boston,
Corbin was from Humboldt Avenue in Roxbury, and Thomas was from
Heath Street in the Jamaica Plain section of Boston.
46
that six or seven men were seen fleeing the victim's apartment
building immediately after the witnesses heard gun shots. It is
within permissible bounds for the prosecutor to infer that a
"team" of men committed the murders. There was no error. See
Commonwealth v. Kozec, 399 Mass. 514, 516-517 (1987).
4. Review pursuant to G. L. c. 278, § 33E. After a full
review of the trial record, we affirm the convictions and
decline to grant extraordinary relief pursuant to G. L. c. 278,
§ 33E.
So ordered.
LOWY, J. (concurring). I agree that the ten-print card
qualifies for the business record exception to the rule against
hearsay. However, I write separately because the card in this
case involves two levels of hearsay: the ten-print card itself
and the information provided by the individual to fill out the
card. I believe the court does not precisely address each
level.
The business records exception to the rule against hearsay
allows information recorded for a business purpose and contained
in a business record in evidence for its truth. See Mass. G.
Evid. § 803(6)(A) (2017). This rule includes out-of-court
statements: if the statement is recorded for a business purpose
and the individual making the statement does so for a business
purpose, the statement is admissible for its truth. See id. If
an out-of-court statement contained in a business record is not
made pursuant to a business purpose, it still may be admissible
if the out-of-court statement is recorded for a business purpose
and the statement falls within another hearsay exception or
exclusion. As the majority points out, an arrestee's legal
obligation does not equate with a business purpose.
However, I believe that the information provided to fill
out the ten-print card fell within the hearsay exclusion for an
opposing party's statement. Mass. G. Evid. § 801(d)(2)(a)
(2017). For the reasons stated by the court, including the
2
defendant's legal obligation to provide identifying information,
the totality of the circumstances established a more than
adequate basis for the judge to conclude -- as a preliminary
question of fact on which admissibility depends and as a matter
of conditional relevance -- that Corbin was the individual who
provided the information. See Mass. G. Evid. § 104(a), (b)
(2017). The ten-print card was properly admitted because the
information in the ten-print card was admissible under an
exclusion from the rule against hearsay, and the ten-print card
was admissible as a business record. Mass. G. Evid.
§ 801(d)(2)(A); § 803(6)(A).