Feeds

Boston dorm computer raid ruled illegal

So much for the hoax email argument

The Power of One Infographic

A justice from Massachusetts's highest court has ordered police to return a laptop and other gear seized from a Boston student's dorm room after rejecting prosecutors' arguments that hoax emails he was suspected of sending might be illegal under a computer crime statute.

The decision, issued Thursday by Justice of the Supreme Judicial Court Margot Botsford, also ordered police to immediately cease any ongoing search of the seized property. Police confiscated 23 items, including three laptops, two iPods, two cellular phones, a digital camera, and a variety of data-storage devices, during a March 30 raid on the dorm room of Boston College (BC) student Riccardo Calixte.

"No one should be subjected to a search like this based on such flimsy theories and evidence," said Matt Zimmerman, a senior staff attorney for the Electronic Frontier Foundation, which helped represent the computer science student. As a result of the seizure, Calixte was forced to complete much of the final month of the semester without a computer, phone or network access, the EFF said.

Calixte came under suspicion following a "domestic dispute" when a roommate told a police detective he had observed Calixte commit two computer crimes. When police requested a warrant to search the dorm room, much of the factual basis provided that a crime had been committed were two emails sent in early March that falsely claimed the roommate was participating on a gay dating website. At least one them was suspected to have been sent by Calixte.

In arguing the search warrant was properly issued, prosecutors argued the hoax emails might violate a Massachusetts statute barring the "unauthorized access" to a computer. Justice Botsford rejected that theory.

"The commonwealth's claim that such an email might be unlawful because it violates a hypothetical internet use policy maintained by BC both goes well beyond the reasonable inferences that may be drawn from the affidavit, and would dramatically expand the appropriate scope of" the statute, she wrote.

She went on to find there was no probable cause to support that Calixte illegally downloaded more than 200 movies and music files and accessed the BC grading system used by professors to change grades.

A PDF of the decision is here. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.