NOTICE: All slip opinions and orders are subject to formal
revision and are superseded by the advance sheets and bound
volumes of the Official Reports. If you find a typographical
error or other formal error, please notify the Reporter of
Decisions, Supreme Judicial Court, John Adams Courthouse, 1
Pemberton Square, Suite 2500, Boston, MA 02108-1750; (617) 557-
1030; SJCReporter@sjc.state.ma.us

SJC-11674

                 COMMONWEALTH vs. EARL T. FULGIAM
                  (and thirteen companion cases1).



            Suffolk.    October 11, 2016. - May 5, 2017.

Present:    Gants, C.J., Botsford, Lenk, Hines, Lowy, & Budd, JJ.2


Homicide. Felony-Murder Rule. Robbery. Firearms. Cellular
     Telephone. Constitutional Law, Search and seizure,
     Probable cause. Search and Seizure, Warrant, Probable
     cause. Probable Cause. Evidence, Fingerprints, Expert
     opinion, Prior misconduct, Relevancy and materiality.
     Witness, Expert. Practice, Criminal, Capital case,
     Warrant.



     Indictments found and returned in the Superior Court
Department on December 21, 2011.

     The cases were tried before Peter M. Lauriat, J.


     Elizabeth Caddick for Earl T. Fulgiam.
     Esther J. Horwich for Michael T. Corbin.
     Zachary Hillman, Assistant District Attorney (John P.
Pappas, Assistant District Attorney, also present) for the
Commonwealth.

     1
       Six against Earl T. Fulgiam and seven against Michael T.
Corbin.
     2
       Justice Botsford participated in the deliberation on this
case prior to her retirement.
                                                                    2




     HINES, J.   On July 25, 2011, armed intruders entered the

apartment occupied by the victims, Kevin Thomas, Jr., and Billie

Marie Kee, who were robbed and killed.   In May, 2013, a Superior

Court jury found the defendants, Earl T. Fulgiam and Michael T.

Corbin, guilty as joint venturers of murder in the first degree

of both victims based on the theories of deliberate

premeditation, extreme atrocity or cruelty, and felony-murder

with armed robbery as the predicate felony.   The defendants also

were convicted of unlawful possession of a firearm and unlawful

possession of a large capacity feeding device.3   On appeal, the

defendants assert error in the admission of (1) certain cellular

telephone records in violation of their rights under art. 14 of

the Massachusetts Declaration of Rights and the Fourth and Sixth

Amendments to the United States Constitution; (2) fingerprint

cards attributed to the defendants without proper authentication

or reliability; and (3) expert testimony related to the

fingerprint analysis.   Corbin independently claims that repeated


     3
       The defendants' convictions of armed robbery of the
victims were dismissed as duplicative and their convictions of
unlawfully carrying a loaded firearm were filed with the
defendants' consent. The defendants were sentenced to
consecutive terms of life without the possibility of parole;
from four to five years on the firearm convictions, to be served
from and after the sentences for murder; and from nine to ten
years on the unlawful possession of a large capacity feeding
device convictions, to be served concurrent with the firearms
convictions.
                                                                      3


references to gang affiliation created a substantial likelihood

of a miscarriage of justice.     We affirm the convictions and

decline to grant relief pursuant to G. L. c. 278, § 33E.

     Background.    We summarize the evidence as the jury could

have found it, reserving additional facts for later discussion.

On July 25, 2011, a couple who lived on the second floor of an

apartment building on Hyde Park Avenue, in the Hyde Park section

of Boston, awoke to the sound of gunshots at around 11:55 P.M.

They heard between six and eight gunshots that the woman

believed came from an apartment below.     The couple looked out of

their bedroom window, and saw six or seven men running out of

the entrance to their building.     The woman telephoned 911 at

11:57 P.M.4

     The men split up.     Some of them ran straight across Hyde

Park Avenue.    At that moment, a passenger in a vehicle

approaching the victim's apartment building saw three men run in

front of her vehicle; one of the men carried what looked like a

white pillow case.     The men got into a grey or silver sedan so

quickly that a man's foot was hanging outside the vehicle as it

sped away.     None of the witnesses was able to give more than a

general description of the men, except that one man was



     4
       This neighbor placed four cellular telephone calls to 911
that evening. Only the calls placed at 11:57 P.M. and 12:41
A.M. are relevant here.
                                                                    4


heavyset;5 the witnesses could only guess at the race or

ethnicity of the men they observed.

     At 12:41 A.M. on July 26, 2011, Boston police responded to

the scene and were directed to the victim's apartment.     They

found a large watch on the floor near the front entrance to the

building.    Kee, dressed in a bloody shirt and underwear, was

found lying face down on the floor just inside the apartment.

She had suffered four gunshot wounds and multiple stab wounds,

and she was pronounced dead at the scene.    Kee's cause of death

was gunshot wounds to the torso and injuries to the lungs, ribs,

and spine.

     Thomas, dressed in a T-shirt, shorts, and socks, was found

in the front bedroom, lying on his back over a pile of clothing;

his legs were bound at the ankles with black wire.    He had

suffered seven gunshot wounds and four stab wounds to his body,

and he was pronounced dead at the scene.    Thomas's cause of

death was gunshot wounds to the torso and neck.

     The victims' apartment had been ransacked.    Broken glass

and blood were on the floor, clothes were strewn about, and the

cabinets and drawers were open in the kitchen and bathroom.

There were no signs of forced entry; the front door was ajar,

with the lock intact, and the back doors were locked from the


     5
       Fulgiam's height and weight are listed on his State police
fingerprint card as five feet, ten inches tall and 300 pounds.
                                                                     5


inside.   Although the officers observed no "land line" telephone

in the apartment, they did not recover any cellular telephones.

A curling iron with its cord cut and two knives with brownish-

red stains were found near Kee's body.     The curling iron cord

matched the wire that was used to bind Thomas's ankles.

    In the front bedroom, in a tall bureau, officers found a

packet of photographs, two of which depicted Thomas with Fulgiam

and Corbin, at Thomas's apartment, sitting on the couch in front

of stacks of United States currency.     Near Thomas's body

officers found a black backpack with what appeared to be a bag

of marijuana inside.

    On July 27, 2011, a subsequent search of the basement

revealed two plastic bags of what appeared to be "crack"

cocaine, and two digital scales.   Based on the all of the

evidence that the police officers had found during their

investigation, they surmised that the assailants were likely

known to the victims and that the murders were likely the result

of a drug robbery.

    In the front yard, officers recovered a loaded nine

millimeter semiautomatic pistol with a magazine and a loaded .38

caliber silver revolver.   A diamond encrusted ring was found on

Hyde Park Avenue.

    John Golden, Thomas's best friend, testified that Thomas

sold large amounts of marijuana and cocaine.     On the day of the
                                                                       6


murders, Golden saw approximately $5,000 in the bureau.       When

Golden was shown the photograph depicting Thomas, Corbin, and

Fulgiam with the bundles of cash, Golden estimated the amount to

be between $12,000 and $13,000.   Police were able to determine

the date of the photograph as May 11, 2011.     Golden also

identified the watch and the ring that had been recovered as

belonging to Thomas.   Golden described Thomas as being

"paranoid," so much so that he insisted that even trusted

friends call before coming to his apartment.

    On July 29, 2011, a latent print from the nine millimeter

semiautomatic pistol recovered from the scene was

"individualized," or matched, to Fulgiam.     Thirteen spent nine

millimeter shell casings, eight spent nine millimeter bullets,

and four bullet fragments were recovered from the scene and from

the victims.   Analysis of the firearms revealed that the nine

millimeter semiautomatic contained a magazine that held twenty

rounds of ammunition; eight were recovered in the magazine.          All

of the bullets, bullet fragments, and shell casings had been

fired from the nine millimeter semiautomatic pistol.

    A detective learned that the victims' cellular telephones

had not been recovered, so he requested and obtained traces on

both.   Thomas's cellular telephone records showed that a certain

cellular telephone number was listed in Thomas's telephone

records for July 25, 2011.   Police learned that this telephone
                                                                    7


had been stolen that afternoon between 4:30 P.M. and 5:30 P.M.

The owner told police that he did not recognize Thomas's

cellular telephone number or the number later identified as

Fulgiam's cellular telephone number, both of which were listed

in his call detail records for July 25, 2011.    The Commonwealth

issued administrative subpoenas for Fulgiam's cellular telephone

call detail records and for a cellular telephone number ending

in 2898, which was later connected to Corbin.6   The police

discovered that Corbin and Thomas had been in contact, via short

message service messages (text messages), or telephone calls,

several times on July 25, 2011.    Fulgiam and Corbin also had

been in telephonic contact that day.

     On August 8, 2011, two detectives interviewed Fulgiam at

his home.   At this time the police had not sought an arrest

warrant for Fulgiam.   Fulgiam told the detectives that he and

Thomas had known one another since the early to mid-2000s, and

that he knew Thomas very well.    Fulgiam admitted that he and

Thomas were in the drug business together and that he would meet

     6
       Fulgiam's call detail and subscriber information was
originally obtained through an administrative subpoena,
discussed infra, issued on August 4, 2011. On August 16, 2011,
additional administrative subpoenas issued for both Fulgiam and
Corbin's subscriber and call detail information. Both Fulgiam
and Corbin's cellular telephone records information, including
call detail information records, subscriber information, cell
site location information (CSLI), and, for Corbin, the content
of text messages, were subsequently obtained through a court
order pursuant to 18 U.S.C. § 2703(d) (2006), also discussed
infra.
                                                                     8


with Thomas one or two times per month, at one of their homes to

conduct business.   He estimated that it had been about one month

since he had last met with Thomas, but could not remember

whether it had been at his home or at Thomas's home.      He last

communicated with Thomas via text message on July 17.      Fulgiam

had Thomas's cellular telephone number, and he stated that he

changed his own cellular telephone number two weeks prior7

because a woman had been stalking him.    Fulgiam was not aware of

Thomas having disputes with anyone and noted that Thomas had a

lot more money than he did.   Fulgiam opined that whoever killed

Thomas had to have been close to him.

     The two detectives interviewed Corbin at his home on August

10, 2011.    At that time, he was not under arrest.    One of the

detectives had previously been in telephonic contact with

Corbin,8 who agreed to meet with the detectives.      Corbin told the

detectives that he had known Thomas since Corbin was thirteen

years old.   Corbin was equivocal about when his last

communication with Thomas occurred; he first said it had been a


     7
       The murders occurred exactly two weeks before the day of
Fulgiam's interview.
     8
       Corbin's cellular telephone account was not listed in his
name, nor did the address given match where Corbin was living at
the time of his interview with police. Corbin's cellular
telephone service provider, Metro PCS, is an advance pay company
which offers a plan providing thirty days of service for a
monthly fee of forty dollars. The company does not conduct a
credit check or verify customer's identification information.
                                                                    9


month prior, but later said it could have been weeks or days

before Thomas was killed.    He stated that the last time he was

in Thomas's apartment was on May 1, 2011, but that he had been

in the apartment many times.     Corbin mentioned that Thomas was

not a showy guy, and that he had a watch and ring, but only wore

them on the weekends.   He also noted that Thomas was a smart and

careful person and that one had to inform Thomas before coming

to his home.

     On September 14, 2011, police learned that fingerprint

analysts had individualized to Corbin's right thumbprint a

latent print found on the curling iron that had been recovered

from the victim's home.     On October 27, 2011, pursuant to a

search warrant, detectives seized Corbin's cellular telephone

ending with the number 2898 (2898 number) and discovered

photographs of Fulgiam, as well as both Fulgiam and Thomas's

numbers programmed into the contact list.     That same day, the

police obtained arrest warrants for Corbin and Fulgiam.

     Discussion.   1.   Admission of cellular telephone records.

a.   Fulgiam's claim.   On August 15, 2011, after a review of

Thomas's cellular telephone records, the Commonwealth sought and

received a court order, pursuant to 18 U.S.C. § 2703(d) (2006)

(§ 2703[d] order), for the historical cell site location
                                                                   10


information (CSLI)9 and other cellular telephone account

information for several cellular telephone numbers that were in

contact with Thomas's cellular telephone on July 25, 2011, the

day of the murder.   Under the authority of the § 2703(d) order,

the Commonwealth obtained Fulgiam's CSLI for the period from

July 20, 2011, through July 30, 2011.

     A review of the CSLI associated with Fulgiam's cellular

telephone number revealed that on the evening of July 25, 2011,

Fulgiam's cellular telephone activated a cell tower located at

an address which is located directly behind the victim's

apartment, six times between 11:30 P.M. and 11:55 P.M.     The last

time Fulgiam's cellular telephone activated the cell tower at

that location was the same time that the neighbors awoke to

gunshots and two minutes before one of them telephoned 911 the

first time.

     Fulgiam argues that the Commonwealth improperly obtained

the CSLI for his cellular telephone without probable cause and

that, in any event, the application for the § 2703(d) order was


     9
       "[CSLI] 'refers to a cellular telephone service record or
records that contain information identifying the base station
towers and sectors that receive transmissions from a [cellular]
telephone.'" Commonwealth v. Estabrook, 472 Mass. 852, 853 n.2
(2015), quoting Commonwealth v. Augustine, 467 Mass. 230, 231
n.1 (2014) (Augustine I), S.C., 470 Mass. 837 and 472 Mass. 448
(2015). "'Historical' CSLI refers to CSLI relating to and
generated by cellular telephone use that has already occurred at
the time of the order authorizing the disclosure of such data."
Augustine I, supra.
                                                                 11


insufficient to show that his CSLI would be "relevant and

material to an ongoing criminal investigation."10   18 U.S.C.

§ 2703(d).   We disagree.

     i.   Standard of review.   In Commonwealth v. Augustine, 467

Mass. 230, 232 (2014) (Augustine I), S.C., 470 Mass. 837 (2015),

we concluded that government-compelled production of CSLI by

cellular telephone service providers was a search in the


     10
       Fulgiam also argues that the Commonwealth relied on
information obtained by an invalid administrative subpoena
issued on August 4, 2011, pursuant to G. L. c. 271, § 17B, to
support its August 15, 2011, application for a § 2703(d) order.
We agree that this administrative subpoena was of questionable
validity where it was signed on behalf of the assistant district
attorney by an administrative assistant. Section 17B requires
strict compliance with the provision that such administrative
subpoenas are issued by attorneys general or district attorneys.
See Commonwealth v. Feodoroff, 43 Mass. App. Ct. 725, 727 (1997)
(common-law exception to § 17B's requirement, which allows
assistant attorneys general and assistant district attorneys to
sign such subpoenas). However, the information that the
Commonwealth obtained pursuant to the August 4 subpoena did not
prejudice Fulgiam. See id. at 728. By August 8, 2011, the
police already had connected Fulgiam to his cellular telephone
account when Fulgiam met with detectives and provided his
cellular telephone number to them. Based on this knowledge, the
police were able to connect Fulgiam's cellular telephone number
to the stolen cellular telephone, as the police already had the
call detail records for that account. The only information that
the police were able to obtain through the August 4 subpoena
that was not already in their possession was the fact that
Fulgiam's cellular telephone had contact with Corbin's cellular
telephone on July 25, 2011. However, even without the
connection to Corbin, the Commonwealth's application for a
§ 2703(d) order contained sufficient facts showing that
Fulgiam's cellular telephone information would be relevant and
material to the ongoing criminal investigation. Consequently,
the information the Commonwealth obtained from Fulgiam's
cellular telephone account from the August 4 subpoena did not
create a substantial likelihood of a miscarriage of justice.
                                                                     12


constitutional sense, requiring a warrant under art. 14 of the

Massachusetts Declaration of Rights.    We determined, however,

that the warrant requirement was a "new" rule applicable only to

those cases where the defendant raised the warrant issue before

or during the trial and the defendant's conviction was not final

at the time that Augustine I was decided.    See id. at 257.

Although Fulgiam's case was on direct appeal when Augustine I

was decided, he did not challenge the sufficiency of the

§ 2703(d) order as a basis for access to his CSLI either before

or during the trial.    Therefore, we review to determine "whether

the unobjected-to admission of the CSLI evidence that was

obtained without a search warrant created a substantial

likelihood of a miscarriage of justice."    Commonwealth v. Broom,

474 Mass. 486, 493 (2016).

    ii.   Analysis.    Because Fulgiam does not have the benefit

of Augustine I, the Commonwealth only had to meet the standard

set forth in § 2703(d) in order to obtain Fulgiam's CSLI.      See

Broom, 474 Mass. at 492.    Section 2703(d) requires that an order

"shall issue only if the governmental entity offers specific and

articulable facts showing that there are reasonable grounds to

believe that the contents of a wire or electronic communication,

or the records or other information sought, are relevant and

material to an ongoing criminal investigation."    The

Commonwealth met that burden.
                                                                     13


    The application recited the following facts that, taken

together, established reasonable grounds to believe that

Fulgiam's CSLI was "relevant and material" to the ongoing

investigation into the Thomas and Kee murders.     First, based on

the review of Thomas's cellular telephone records, the police

were aware that Thomas's cellular telephone was involved in an

ongoing text message dialog with the stolen cellular telephone

between 11:05 P.M. and 11:32 P.M. on the night of the murders

and that the stolen cellular telephone was in contact with

Fulgiam's cellular telephone twice that day.     Fulgiam's last

communication with the stolen cellular telephone was a text

message sent at 11:37 P.M., at or near the time of the murders.

At 11:57 P.M., shortly after this last contact between Fulgiam's

cellular telephone and the stolen cellular telephone, the police

received the first 911 call for a disturbance at the victims'

apartment.   Second, Fulgiam had admitted to police that he knew

Thomas and that they were in the drug business together.     Based

on the affiant's training and experience, that business

connection, the lack of forced entry into the apartment

(suggesting that the victims knew the assailants), and the

ransacked condition of the crime scene placed Fulgiam's cellular

telephone records squarely within the realm of information

"relevant and material" to the ongoing investigation into the

murder of the victims.   Thus, Fulgiam cannot demonstrate that
                                                                     14


the § 2703(d) order was invalid and that as a consequence, the

Commonwealth's access to his CSLI created a substantial

likelihood of a miscarriage of justice.      See Broom, 474 Mass. at

493.

       b.   Corbin's claims.   Using the § 2703(d) order issued on

August 15, the Commonwealth obtained Corbin's cellular telephone

subscriber and call detail information, CSLI, and text messages

for the period from July 20 through July 30, 2011.     Corbin, like

Fulgiam, did not challenge the Commonwealth's access to these

records either before or during the trial.      On appeal, however,

Corbin argues that the Commonwealth's access to and use of these

records at trial was unlawful on statutory and constitutional

grounds, and that his trial counsel was constitutionally

ineffective in failing to file a motion to suppress the records.

More specifically, Corbin claims that (1) the application for

the § 2703(d) order (§ 2703[d] application) failed to make the

required showing that the records were "relevant and material"

to an ongoing criminal investigation; and (2) the access to and

use of the content of his text messages at trial was improper

because the § 2703(d) application failed to establish probable

cause to believe "that a particularly described offense has

been, is being, or is about to be committed, and that [the

content of the text messages being sought] will produce evidence

of such offense or will aid in the apprehension of a person who
                                                                      15


the applicant has probable cause to believe has committed, is

committing, or is about to commit such offense" as required by

18 U.S.C. § 2703(a) and art 14.11     Augustine I, 467 Mass. at 256,

quoting Commonwealth v. Connolly, 454 Mass. 808, 825 (2009).

These claims fail.

     i.   Standard of review.    Where, as here, the defendant has

been convicted of murder in the first degree, we review his

claim of ineffective assistance of counsel to determine whether

the alleged lapse created a "substantial likelihood of a

miscarriage of justice," a standard more favorable to the

defendant than the constitutional standard otherwise applied

under Commonwealth v. Saferian, 366 Mass. 89, 96 (1974).

Commonwealth v. Wright, 411 Mass. 678, 681-682 (1992), S.C., 469

Mass. 447 (2014).    We focus more broadly on whether there was

error and, if so, whether any such error "was likely to have

influenced the jury's conclusion."     Id.   If the defendant's

claim of ineffective assistance of counsel is based on the

failure to file a motion to suppress, he must "show that the

motion to suppress would have been successful, and that failing

to bring such a motion . . . created a substantial likelihood of

a miscarriage of justice."      Commonwealth v. Banville, 457 Mass.

530, 534 (2010).


     11
       Corbin does not challenge the use of his cellular
telephone CSLI at trial.
                                                                  16


    If the failure to file a motion to suppress resulted from

counsel's tactical decision not to do so, the defendant must

demonstrate that this strategic choice was "manifestly

unreasonable" when made (quotations and citation omitted).

Commonwealth v. Kolenovic, 471 Mass. 664, 674 (2015).     Here,

however, the record is unclear as to whether counsel's decision

was tactical, as the defendant did not file a motion for new

trial on this ground, clarifying the record on trial counsel's

reason for his choice.

    ii.   Likelihood of success on the motion to suppress.

Because the analysis of the likelihood of success on a motion to

suppress the subscriber and call detail information is governed

by a legal standard that is different from that applicable to

text messages, we consider each category of information

separately.

    A.    Subscriber and call detail information.   To secure a

§ 2703(d) order allowing access to subscriber and call detail

information, the application must establish "specific and

articulable facts showing that there are reasonable grounds to

believe that the [information sought is] relevant and material

to an ongoing criminal investigation."   18 U.S.C. § 2703(d).

Corbin argues that the Commonwealth's application was

insufficient to meet this test.   We disagree.
                                                                     17


       The § 2703(d) application, reciting a series of calls and

text messages between Thomas and Corbin on the day of the

murders,12 was more than sufficient to establish that Corbin's

subscriber and call detail information was "relevant and

material" to the investigation into the murders of Thomas and

Kee.    Id.   The application included information that (1) Thomas

and Corbin personally knew one another; (2) there appeared to be

no forced entry at the crime scene, suggesting the victims knew

the assailants; (3) the crime scene had been ransacked and,

based on the affiant's training and experience, the murders

appeared to be a result of a drug robbery; (4) drug dealers tend

to communicate via cellular telephone to coordinate drug

purchases; and (5) on the day of the murders, Corbin's cellular

telephone number had multiple telephonic communications,

including text messages, with both Fulgiam and Thomas.     Given

these facts, a motion to suppress on this ground was

demonstrably lacking in merit.     Thus, Corbin has failed to meet

his burden to establish that the failure to file a motion to

suppress the use of the subscriber and call detail information

created a substantial likelihood of a miscarriage of justice.


       12
       After securing Thomas's cellular telephone records, the
police focused their investigation on the calls to and from
Thomas's cellular telephone. The Commonwealth had associated
Corbin with his cellular telephone account prior to its
§ 2703(d) application and used such information in the
application.
                                                                   18


     B.   Text messages.   Corbin argues that counsel was

ineffective in failing to file a motion to suppress the content

of the text messages where the Commonwealth obtained access

without a warrant under 18 U.S.C. § 2073(a) and art. 14.    We

agree that, on both statutory and constitutional grounds, a

warrant was required to obtain access to the content of Corbin's

text messages and that a motion to suppress challenging the

Commonwealth's access on these grounds likely would have been

successful.

     I.   Warrant requirement for access under § 2703(a).   Access

to the "contents of wire or electronic communications in

electronic storage" is governed by 18 U.S.C. § 2703(a), which

provides that "[a] governmental entity may require the

disclosure by a provider of electronic communication service[13]

of the contents of a wire or electronic communication, that is

in electronic storage in an electronic communications system for

one hundred and eighty days or less only pursuant to a warrant

. . . (in the case of a State court, using State warrant

procedures) by a court of competent jurisdiction" (emphases

supplied).    Because it is undisputed that Corbin's "electronic

communications" (text messages) met the temporal requirement of

     13
       The Stored Communications Act, 18 U.S.C. §§ 2701-2712
(2006), defines an electronic communication service as "any
service which provides users thereof the ability to send or
receive wire or electronic communications." 18 U.S.C.
§ 2510(15) (2006). See 18 U.S.C. § 2711.
                                                                  19


§ 2703(a), the dispositive issue is whether this content was

held in "electronic storage" by "a provider of electronic

communication service."   Id.

     The Commonwealth argues that the warrant requirement of

§ 2703(a) does not apply to Corbin because text messages are

held by a provider of a "remote computing service"14 rather than

an "electronic communication service" and that, as a

consequence, access may be obtained without a warrant under

§ 2703(b).   We reject the Commonwealth's argument because we

agree with the defendant that the text messages at issue here

were held by a provider of an "electronic communication service"

for less than 180 days, which triggered the warrant

requirement.15


     14
       A "remote computing service" is defined as "the provision
to the public of computer storage or processing services by
means of an electronic communications system." 18 U.S.C.
§ 2711(2) (2006). In practice, this phrase is understood to
refer to the use of "remote computers [to] store extra files or
process large amounts of data" by commercial customers. See
Kerr, A User's Guide to the Stored Communications Act, and a
Legislator's Guide to Amending It, 72 Geo. Wash. L. Rev. 1208,
1213-1214 (2004).
     15
       General Laws c. 271, § 17B, is the analog to 18 U.S.C.
§ 2703(a), which treats the government's access to the content
of electronic communications in a different manner from
noncontent information. Both laws demand a higher standard of
proof, beyond "relevant and material to an ongoing criminal
investigation," 18 U.S.C. § 2703(d), to access the content of
electronic communications. Compare 18 U.S.C. § 2703(a)
(allowing access to content of electronic communications stored
in electronic communications service for 180 days or less only
pursuant to warrant), with G. L. c. 271, § 17B (specifically
                                                                    20


    Although the Supreme Court has not defined "electronic

communication service" as used in § 2703(a), we adopt the

approach in Quon v. Arch Wireless Operating Co., 529 F.3d 892

(9th Cir. 2008), overruled on other grounds sub nom. City of

Ontario, Cal. v. Quon, 560 U.S. 756 (2010), where the court's

analysis focused on the actual services offered to the consumer

to determine whether the entity is a provider of "electronic

communication service" or "remote computing service."     See id.

at 900, 901.   Relying on the plain language of the statute, the

Quon court concluded that the definition of "electronic

communications service" as "any service which provides users . .

. the ability to send or receive wire or electronic

communications[,]" 18 U.S.C. § 2510(15) (2006), applied "[o]n

its face" to the text messaging service at issue in that case.

Id. at 901.    That same logic applies here to the text message

service provided by Corbin's cellular telephone carrier.

    This interpretation is consistent with the heightened

protection for the content of electronic communications.    In

Riley v. California, 134 S. Ct. 2473 (2014), the United States

Supreme Court held that police officers must secure a search

warrant prior to searching a cellular telephone, as modern

cellular telephones contain "vast quantities of [digital]



excluding access to content of electronic communications from
statute).
                                                                   21


personal information."    Id. at 2485.   See United States v.

Warshak, 631 F.3d 266, 286 (6th Cir. 2010) (electronic mail

messages "require[] strong protection under the Fourth

Amendment; otherwise, the Fourth Amendment would prove an

ineffective guardian of private communication, an essential

purpose it has long been recognized to serve").    A search of the

content of text messages implicates similar privacy interests.

Just as the government may not intercept private telephone calls

or written communications without a warrant, we conclude that

the Commonwealth may not obtain the content of text messages

without a warrant.   See United States v. Jacobsen, 466 U.S. 109,

114 (1984) (warrantless searches of letters and other sealed

packages is presumptively unreasonable); Katz v. United States,

389 U.S. 347, 361 (1967) (Harlan, J., concurring).

    II.     Warrant requirement under art. 14.   Because the United

States Supreme Court has yet to decide whether access to the

content of text messages requires compliance with the warrant

requirement of § 2703(a), we consider the issue under art. 14,

as articulated in Augustine I.    We conclude that a warrant was

required to obtain access to the content of Corbin's text

messages.    Access to the content of a text message constitutes a

search requiring a showing of probable cause which in this

context means "probable cause to believe 'that the particularly

described offense has been, is being, or is about to be
                                                                    22


committed, and that [the text message content being sought] will

produce evidence of such offense or will aid in the apprehension

of a person who the applicant has probable cause to believe has

committed, is committing, or is about to commit such offense.'"

Augustine I, 467 Mass. at 256, quoting Connolly, 454 Mass. at

825.

       A warrant with probable cause was required because Corbin

had a reasonable expectation of privacy in the content of his

text messages.    "The measure of the defendant's [reasonable]

expectation of privacy is (1) whether the defendant has

manifested a subjective expectation of privacy in the object of

the search, and (2) whether society is willing to recognize that

expectation as reasonable."    Commonwealth v. Montanez, 410 Mass.

290, 301 (1991).    See Katz, 389 U.S. at 361 (Harlan, J.,

concurring).    As the Commonwealth notes, the defendant did not

file a motion for a new trial or a motion to suppress, and for

that reason, the judge did not hold an evidentiary hearing to

determine whether Corbin had a subjective expectation of privacy

in the contents of the text messages from the 2898 number.       The

record, however, establishes that Corbin had a subjective

expectation of privacy in the content of his text messages.      See

Montanez, supra at 301.

       As mentioned above, Corbin provided the police with his

cellular telephone number prior to his arrest.    At trial he
                                                                   23


offered the CSLI associated with the cellular telephone account

as evidence that he was not in Hyde Park on July 25, 2011,

implicitly claiming ownership of the cellular telephone account;

and the cellular telephone associated with the 2898 number was

seized from Corbin pursuant to a search warrant prior to his

arrest.   Moreover, the Commonwealth consistently attributed the

cellular telephone account to Corbin.    See Commonwealth v.

Augustine, 472 Mass. 448, 452 n.6 (2015) (Augustine II)

(cellular telephone owned by another treated as belonging to

defendant where he paid bills and used it exclusively).   To be

sure, the fact that a defendant's name is not listed as the

subscriber of the account could diminish his subjective

expectation of privacy.   However, on the facts of this case,

Corbin's implicit acknowledgment of ownership satisfied his

burden.   See Commonwealth v. Genest, 371 Mass. 834, 836 (1977)

(defendant has burden to show reasonable expectation of

privacy).

    Similarly, Corbin had an objectively reasonable expectation

of privacy in his text messages.   In Augustine I, 467 Mass. at

255, we recognized an objectively reasonable expectation of

privacy in a defendant's CSLI records.   We further stated "that

the nature of cellular telephone technology and CSLI and the

character of cellular telephone use in our current society

render the third-party doctrine of [United States v.] Miller[,
                                                                     24


425 U.S. 435 (1976),] and Smith [v. Maryland, 442 U.S. 735

(1979),] inapposite."   Augustine I, supra at 245.   The same

result applies here with respect to the content of text messages

stored on a cellular telephone service provider's servers.

     Because we conclude that probable cause was required to

obtain the content of Corbin's text messages, we next consider

whether the application established the requisite probable cause

for access to Corbin's text messages.   See id at 256.

     The application established a personal relationship between

Thomas and Corbin, that Corbin was in telephonic contact with

both Thomas and Fulgiam on the day of the murders, and that the

circumstances of the murders suggested a connection to drugs.

Although the fact that Thomas and Corbin may have used their

cellular telephones to communicate with each other on the day of

the murders elevated their relationship to a matter of

importance in the investigation, it did not, without more,

justify intrusion into the content of that communication.16     In


     16
       On July 25, 2011, between 2:15 P.M. and 7:27 P.M., Corbin
and Thomas exchanged the following text messages:

     Thomas:   "What hapnd bro i need that"

     "I need 2 c u like yesterday i have 2 get a whip manana n i
     def need that bread i would appreciate if u didnt hold me
     up"

     "This is what i didnt want 2 happen we discussed this b4
     bro straightn me first remember dnt make it bad bro"
                                                                  25


contrast to Fulgiam, nothing in the application indicated a drug

connection between Corbin and Thomas, such that Corbin might

have a motive for murder.   Other than the cellular telephone

communication between Thomas and Corbin, the application failed

to recite any facts that might have implicated Corbin in the

crimes or suggested that the content of his text messages would

aid in the apprehension of a suspect in the murders. See

Augustine I, 467 Mass. at 256.   Given these shortcomings in the

application, we conclude that the Commonwealth failed to

establish the requisite probable cause and, therefore,

improperly obtained the content of Corbin's text messages.

    The Commonwealth argues that, in any event, Corbin lacked

standing to challenge the access to the content of the text

messages because the cellular telephone account was held under a


    Corbin: "Bro u know i do what i can 2 get u first but i
    called u. I cant hold these niggers up."

    Thomas: "n my bread u feel me wit out me it neva would
    have been there 2 flip anything"

    "U cant hold anyone up when its not there bread thats free
    money i should have mine off the top than play with urs not
    mine bro we talkd about this ur flip"

    Corbin: "I see u going through some thing cause we never
    kicked it like this. im going 2 put as much 2gether 4 u
    not in 2 long"

    Thomas: "Good look lol naw cause someone did somethng
    simular just cause i say im somewhre u cant assumd my
    schedule or do ur own thng thats all im tryna say talk"

    "2 you when u come bro"
                                                                  26


fictitious name or held by someone other than Corbin.    "A

defendant has standing either if [he] has a possessory interest

in the place searched or in the property seized or if [he] was

present when the search occurred."   Commonwealth v. Williams,

453 Mass. 203, 208 (2009).   The Commonwealth argues that the

defendant has not made the requisite showing that he had a

possessory interest in the cellular telephone account for the

2898 number because Corbin did not move for a new trial and file

an affidavit averring such a possessory interest in the account,

or present any affirmative evidence showing such an interest.

However, the Commonwealth consistently has asserted that the

listed account holder for the 2898 number was Corbin.    In its

§ 2703(d) application, the Commonwealth associated the 2898

number with Corbin.   Throughout the trial the Commonwealth

asserted that Corbin sent the text messages it offered in

evidence, and it offered Corbin's CSLI to show that there was no

activity on his cellular telephone during the murders.

Moreover, a detective testified that another detective was in

telephonic contact with Corbin using the 2898 number.    Finally,

the cellular telephone associated with the 2898 number was

seized from Corbin and searched pursuant to search warrant.17


     17
       The Commonwealth obtained Corbin's cellular telephone
pursuant to a search warrant on October 27, 2011; however, it
previously had obtained the content of his text messages
pursuant to its August 15 § 2703(d) application.
                                                                  27


Given these facts, Corbin has standing to challenge the

warrantless search of the content of the text messages sent from

the 2898 number.18   See Williams, supra at 208.

     Last, we reject the Commonwealth's argument that customers

of cellular service providers such as Metro PCS, which are

advance-pay services, assume the risk that the content of

information stored on its servers will be disclosed to third

parties.   To support its argument, the Commonwealth notes that

companies such as Metro PCS do not conduct credit checks or

verify the identity of its customers, and that as a consequence,

customers who engage the services of such companies have a less

objectively reasonable expectation of privacy.     In determining a

subscriber's reasonable expectation of privacy, we decline to

distinguish between those who choose not to submit to a credit

check, or do not have credit, or are not the named account


     18
       Corbin established standing here, in part, through his
implicit acknowledgment of ownership of the cellular telephone
account associated with the 2898 number, prior to and during
trial. We note that a defendant, connected to a cellular
telephone account with a cellular telephone service provider
under an assumed name, will not automatically have standing to
challenge the search of the information relating to the cellular
telephone account. Such a defendant, as here, must establish
both standing and a reasonable expectation of privacy in order
to challenge such a search. See Commonwealth v. Williams, 453
Mass. 203, 207-208 (2009). Additionally, we acknowledge that
the posture of this case made the determination of standing and
reasonable expectation of privacy more difficult. The better
practice is to assert this claim through a motion for a new
trial and present affirmative evidence to support a defendant's
entitlement to challenge such a search.
                                                                   28


holder on a cellular telephone account and those customers who

identify themselves or have established credit.

     iii.    Substantial likelihood of a miscarriage of justice.

We now ask whether the admission of the text messages, which

could have been suppressed, created a substantial likelihood of

a miscarriage of justice and "likely . . . influenced the jury's

conclusion." Williams, 453 Mass. at 205, quoting Wright, 411

Mass. at 682.     We conclude that it did not.

     Corbin's defense was that he was innocent and that Thomas,

as a high level drug dealer, was in a dangerous business.

Corbin claimed that many people knew Thomas was a drug dealer

and, for that reason, he was a target for drug robbery.

Corbin's argument that the content of his text messages was the

only evidence from which the jury could find a motive and

opportunity for Corbin to commit the murders is belied by the

record.     Much of the information about Thomas's status as a high

level drug dealer came in through other evidence.19

     In addition, based on evidence wholly independent of the

text messages, Corbin's involvement in the murders was not a


     19
       Thomas's best friend testified that Thomas was selling "a
few thousand dollars" worth of marijuana per week and
approximately $4,000 or $5,000 worth of cocaine per week.
Additionally, that friend testified that it was common in the
drug business for a higher level dealer to supply drugs to
"street-level" dealers for sale, and the jury heard evidence
that Fulgiam admitted to being in the drug business with Thomas
and that Thomas had a lot more money than Fulgiam.
                                                                  29


close question.   The discovery of Corbin's fingerprint on the

barrel of the curling iron found near Kee's body was highly

inculpatory, as was the evidence of Corbin's telephonic contact

with Fulgiam, Thomas, and the stolen cellular telephone on the

day of the murders.   The inference that Corbin was in possession

of the cellular telephone stolen a few hours before the murders,

and that he used this telephone to contact Thomas on multiple

occasions, including within two hours of the murders, also was

highly inculpatory.   The jury also heard evidence that Thomas,

Corbin, and Fulgiam were involved in the drug business together

and that the murders were likely connected to a drug robbery.

Moreover, although we recognize that trial counsel was faced

with the task of downplaying the impact of the text messages

once they were admitted in evidence, he affirmatively used this

content in his closing argument to establish that (1) Thomas had

a significant amount of drugs and money in his apartment most of

the time; (2) Thomas was a "tempting" target for robbery; and

(3) the nature of Thomas's business was such that persons other

than Corbin could have a motive to kill Thomas.   Against the

backdrop of this highly incriminating evidence, we cannot say

that the jury's exposure to Corbin's text messages likely

influenced the jury's verdict.   Therefore, Corbin cannot meet

his burden to establish that trial counsel's failure to file a
                                                                   30


motion to suppress the content of his text messages created a

substantial likelihood of a miscarriage of justice.

     2.   Fingerprint analysis.   The Commonwealth presented the

following evidence to prove its contention that the fingerprint

analysis placed both defendants at the scene of the crime during

the murders.    Although police criminalists were able to obtain

several latent fingerprints20 from items at the scene,

ultimately, only five latent prints were individualized21 to

defendants.    Four latent prints were recovered from the magazine

of the nine millimeter semiautomatic pistol, and one thumbprint

was recovered from the barrel of the curling iron found near

Kee's body.

     During her testimony, a fingerprint analyst explained that

latent print analysts compare the latent prints recovered from

crime scenes to known prints, i.e., fingerprint impressions

taken in a controlled setting, either in ink or on a scanner.

Insofar as relevant here, police produced a card, known as a

"ten-print" card, which includes the ten fingerprint


     20
       A latent print is "a fingerprint that generally can't be
seen right away, and [one] would need further processing in
order for it to be seen."
     21
       Individualization is "when a latent print examiner comes
to a conclusion that there is a sufficient amount of detail of
quality and quantity of those details between the latent print
and the known fingerprint to arrive at that conclusion, to
establish that the latent print originated from the known print
or that donor."
                                                                    31


impressions, the name of the person who is being fingerprinted,

typically a signature of that person, and other identifying

information, such as date of birth and address.     Police latent

print analysts access the known prints through certain

databases.   The latent print analysts use a method known as

analysis, comparison, evaluation, and verification, or ACE-V, to

compare the latent prints recovered to known prints.

     With respect to Corbin's fingerprint, the analyst explained

that she began by using the ACE-V methodology to determine that

the latent print had sufficient quality and quantity of detail

for comparison purposes.   Next, she obtained possible matches

through a fingerprint database, including the ten-print card of

Corbin that was maintained by the State police and created on

July 7, 2005.22   Finally, after performing the ACE-V methodology

again, the analyst "individualized the right thumb" of Corbin to

the latent print recovered from the curling iron.

     With respect to Fulgiam's fingerprints, four of seven

latent fingerprints that were recovered from the magazine of the

nine millimeter semiautomatic pistol were individualized to him.

The analyst explained, over objection, that she generated the

Fulgiam's known ten-print card, maintained by the State police

and created on July 18, 2011, for comparison with the recovered


     22
       Corbin's ten-print card was admitted in evidence over
objection.
                                                                    32


latent prints.23   Next, applying the ACE-V methodology, she

individualized the four latent prints to Fulgiam.

     a.   Ten-print cards.    The defendants argue that the judge

erred in admitting the ten-print cards under the business

records exception to the hearsay rule.     See G. L. c. 233, § 78;

Mass. G. Evid. § 803(6)(A) & note (2017).     More specifically,

the defendants argue that because the statements underlying the

ten-print card were made by persons having no business duty to

report the information accurately, the statements fall outside

the scope of the business records exception to the hearsay rule.

We disagree.

     The business records exception to the hearsay rule

provides, in relevant part:     "a writing or record, . . . made as

a memorandum or record of any act, transaction, occurrence or

event, shall not be inadmissible in any civil or criminal

proceeding as evidence of the facts therein stated because it is

transcribed or because it is hearsay or self-serving."     G. L.

c. 233, § 78.   A record falls within the scope of the business

records exception to the hearsay rule, set forth in § 78, "if

the judge finds that it was (1) made in good faith; (2) made in

the regular course of business; (3) made before the action

     23
       As discussed infra, both Corbin and Fulgiam vigorously
contested the assertion that the ten-print cards associated with
them actually contained their fingerprints because the ten-print
cards lacked certain identifying information, including both
Corbin and Fulgiam's signatures.
                                                                    33


began; and (4) the regular course of business to make the record

at or about the time of the transaction or occurrences

recorded."   Beal Bank, SSB v. Eurich, 444 Mass. 813, 815 (2005),

citing DiMarzi v. American Mut. Ins. Co., 389 Mass. 85, 105

(1983).   If such findings are made, the record "is presumed to

be reliable and therefore admissible."   Wingate v. Emery Air

Freight Corp., 385 Mass. 402, 406 (1982).

    This presumption, however, does not automatically extend to

the out-of-court statements made by a secondary source that the

record preparer relies on when creating the record.   The

essential element underlying the presumption of reliability is

the theory that "entries in these records are routinely made by

those charged with the responsibility of making accurate entries

and are relied on in the course of doing business."     Id.   Where

the person providing information to the preparer is unconnected

to the business, and thus is under no business duty to provide

accurate information, this essential element is lost.    Although

§ 78 provides that preparer's personal knowledge (or lack

thereof) goes to the record's weight, not its admissibility,

this provision does not negate the requirement that, where the

information contained within the record is offered for its

truth, the source from which the preparer obtained the

information "must carry the same indicia of reliability, arising
                                                                       34


from regularity and business motives, that bring his own act of

recording the information within the statutory exception."        Id.

    To demonstrate that the preparer's hearsay source bears the

same indicia of reliability as the preparer, the proponent need

not produce each speaker.     Beal Bank, SSB, 444 Mass. at 816.

Rather, the proponent need only present evidence demonstrating

that the hearsay source "reported the information as a matter of

business duty or business routine."     Wingate, 385 Mass. at 406.

Such was the case in Beal Bank, SSB, where the proponent bank

introduced, as its own business record, a printout of a report

produced and provided to it by the bank's loan servicing agent

(agent).    Beal Bank SSB, supra at 816.     In determining that the

judge did not abuse his discretion in admitting the document as

a business record, we noted that because the agent serviced the

bank's loans pursuant to a contract, the bank manager's

testimony regarding the records was sufficient to support the

admission of the documents.    Id. at 817.    Key to this

determination was the existence of a business relationship

between the bank and it agent.    We noted, "this is not a case

where the bank is simply receiving information from another

business.    Rather, [the agent] is the bank's servicing agent; it

has a business duty [to accurately report] the information to

the bank; and the bank routinely accesses and relies on that

information."   Id.
                                                                    35


     In this case, the Commonwealth introduced two ten-print

cards created by the State police, each of which bore ten

fingerprints and identifying information associated with the

defendants.24   As a threshold matter, we determine that the ten-

print cards meet the statutory requirements under the business

records exception.25   The admissibility of the identifying

information provided by the persons being fingerprinted and

reflected on the ten-print card, however, is not so easily

established.    Unlike in Beal Bank, SSB, here, the persons being

fingerprinted had neither a contractual obligation nor a

business duty to provide accurate and reliable identifying

information.    Thus, the protections that "arise[] from

regularity and business motives,"    Wingate, 385 Mass. at 406,

are inapplicable here.



     24
       Specifically, one of the ten-print cards reflected
Corbin's name, aliases, date of birth, sex, race, place of
birth, height, weight, eye and hair color, and Social Security
number. The other reflected Fulgiam's name, date of birth, sex,
race, place of birth, height, weight, and eye and hair color.
Neither ten-print card reflected the signature of the person
fingerprinted, although the ten-print card provides space for
such information.
     25
       The Commonwealth's witness, a State police trooper,
testified that the ten-print records were maintained in the
State police's identification unit, located in Sudbury, and
confirmed that such records were typically produced, entered,
and maintained for administrative purposes in good faith, in the
ordinary course of business of the State police. The trooper
also confirmed that the ten-print cards were created prior to
the commencement of the case.
                                                                   36


    Here, the officer who creates the ten-print card has a duty

to ensure that the person who is being fingerprinted is

accurately identified.   Otherwise, such cards would have little

value to law enforcement.   Moreover, G. L. c. 268, § 34A,

states:   "[w]hoever knowingly and willfully furnishes a false

name or Social Security number to a law enforcement officer or

law enforcement official following an arrest shall be punished

by a fine or not more than $1,000 or by imprisonment in a house

of correction for not more than one year or by both such fine

and imprisonment."   Therefore, based on the officers' duty to

ensure the ten-print cards are created with accurate

information, and the arrestees' legal obligation to provide

accurate information, we conclude that the identifying

information on the cards is reliable and brings the identifying

evidence reflected on the ten-print card within the scope of the

business records exception to the hearsay rule.   See Wingate,

385 Mass. at 406.

    The defendants argue that the ten-print cards do not fall

within the scope of the business records exception to the

hearsay rule because the Commonwealth failed to present evidence

that the person taking the fingerprints verified the identities

of the persons fingerprinted.   See United States v. Vigneau, 187

F.3d 70, 77 (1st Cir. 1999), cert. denied, 528 U.S. 1172 (2000)

(admission of sender's name, address, and telephone number
                                                                  37


reflected on Western Union "To Send Money" form for truth was

error where Western Union did not have practice of verifying

such information).   Although we agree that verification may be a

best practice, we conclude that the presence or absence of

independent verification bears on the weight of the record

rather than its admissibility under the business records

exception.   In addition, the defendants point out that important

information, including signatures of the person taking the

fingerprints, and signatures of the persons being fingerprinted

are missing.   These issues also go to the weight, which may be

subject to intense scrutiny on cross-examination, rather than

the admissibility of the evidence.

    We are also not persuaded by Corbin's argument that the

ten-print cards were inadmissible because the Commonwealth

presented testimony from a witness who did not actually take or

maintain the ten-print cards.   Section 78 makes clear, as has

this court, that the admissibility of a document under the

business records exception does not turn on the personal

knowledge of the record's preparer.   See Wingate, 385 Mass. at

406, quoting G. L. c. 233, § 78 ("'personal knowledge by the

entrant or maker' is a matter affecting the weight [rather than

the admissibility] of the record").   Accordingly, we conclude
                                                                  38


that the ten-print were properly admitted under the business

records exception to the hearsay rule.26

     Last, the defendants argue that the admission of the ten-

print cards violated the right of confrontation as guaranteed by

the Sixth Amendment to the United States Constitution and art.

12 of the Massachusetts Declaration of Rights.   We disagree.

The Supreme Court of the United States has made clear that the

confrontation clause "guarantees a defendant the opportunity to

confront any person, in the 'crucible of cross examination,'

whose 'testimonial' statements are introduced against him."

Commonwealth v. Siny Van Tran, 460 Mass. 535, 552 (2011),

quoting Crawford v. Washington, 541 U.S. 36, 51-52, 61 (2004).

Similarly, art. 12 "commands that 'every subject shall have a

right . . . to meet the witnesses against him face to face.'"

Commonwealth v. Amirault, 424 Mass. 618, 628 (1997), quoting

art. 12.   "It is the testimonial character of any item of

evidence that triggers the confrontation right, notwithstanding

its admissibility under statute, State rule, or a common-law

hearsay exception."   Siny Van Tran, 460 Mass. at 552, citing

Melendez-Diaz v. Massachusetts, 557 U.S. 305, 323 (2009).

However, "[m]ost of the hearsay exceptions covered statements


     26
       Because of our conclusion, we need not address Corbin's
argument that trial counsel's failure to object to the validity
of the ten-print card constituted ineffective assistance of
counsel.
                                                                  39


that by their nature were not testimonial -- for example,

business records or statements in furtherance of a conspiracy."

Melendez-Diaz, 557 U.S. at 324, citing Crawford, 541 U.S. at 56.

The Court clarified, "[b]usiness and public records are

generally admissible absent confrontation not because they

qualify under an exception to the hearsay rules, but because --

having been created for the administration of an entity's

affairs and not for the purpose of establishing or proving some

fact at trial -- they are not testimonial."   Melendez-Diaz,

supra.

    Fingerprint records are nontestimonial because they are

created for the "administration of an entity's affairs" rather

than to establish or prove some fact at trial.   Commonwealth v.

Weeks, 77 Mass. App. Ct. 1, 5 (2010).   See Melendez-Diaz, 557

U.S. at 324.   Here, the trooper testified that ten-print cards

are created in the ordinary course of business in good faith,

and Corbin and Fulgiam's ten-print cards were created prior to

the commencement of the trial.   The ten-print cards were

business records under G. L. c. 233, § 78.    Because the ten-

print cards are business records, we conclude that the admission

of the ten-print cards did not violate the defendants' right to

confront witnesses against them protected by the Sixth Amendment

and art. 12.
                                                                    40


    b.   Testimony of fingerprint analyst.   The defendants

challenge the admission of the Commonwealth's fingerprint expert

witness testimony on several grounds.   The defendants first

argue that the Commonwealth's expert witness improperly

testified to the result of her fingerprint analysis in absolute

terms, stating that she had individualized the defendants'

fingerprints to prints found at the scene of the crime.

According to the defendants, the introduction of expert

fingerprint testimony stating the results of fingerprint

analysis in absolute terms is inconsistent with recent science

questioning the accuracy and reliability of fingerprint analysis

and the ACE-V methodology.   Because the defendants did not

object to this aspect of the testimony at trial, our inquiry is

whether any error created a substantial likelihood of a

miscarriage of justice.   Wright, 411 Mass. at 682.

    We have on several occasions addressed the issue of the

ACE-V methodology and expert testimony based on it.   See, e.g.,

Commonwealth v. Gambora, 457 Mass. 715, 724-728 (2010), and

Commonwealth v. Patterson, 445 Mass. 626, 641-655 (2005).      In

Gambora, supra at 724, we discussed in great depth a 2009 report

published by the National Research Council for the National

Academy of Sciences (NAS Report), which raised several issues

regarding the reliability of certain aspects of the ACE-V
                                                                   41


methodology and the expert testimony that relies upon it.27      The

central issue raised in the NAS Report was "the need to prevent

overstatement of the accuracy of fingerprint comparisons, and

for additional research."    Commonwealth v. Joyner, 467 Mass.

176, 181 (2014), quoting Gambora, supra at 726.    Although we

stated that "courts historically have found fingerprint evidence

to be admissible," Joyner, supra at 180, quoting Patterson, 445

Mass. at 644, we also noted that "[t]estimony to the effect that

a latent print matches, or is 'individualized' to, a known

     27
          In Gambora we stated:

          "The [NAS] report does not appear to question the
     underlying theory which grounds fingerprint identification
     evidence; as the report states, there is scientific
     evidence supporting the theory that fingerprints are unique
     to each person and do not change over a person's
     life. . . . However, the NAS report adds, '[u]niqueness and
     persistence are necessary conditions for friction ridge
     identification [i.e., fingerprint identification] to be
     feasible, but those conditions do not . . . guarantee that
     prints from two different people are always sufficiently
     different that they cannot be confused, or that two
     impressions made by the same finger will also be
     sufficiently similar to be discerned as coming from the
     same source'" (citations omitted).

Commonwealth v. Gambora, 457 Mass. 715, 724-725 (2010), citing
National Research Council, Strengthening Forensic Science in the
United States, A Path Forward 143-144 & n.34 (2009) (NAS
Report). Moreover, we stated that although the NAS Report does
not draw the conclusion that fingerprint evidence lacks such
reliability that courts should no longer deem it admissible, the
report does "stress the subjective nature of the judgments that
must be made by the fingerprint examiner at every step of the
ACE-V process, including an examiner's ultimate conclusion that
a latent print is 'individualized' to a specific, identified,
known print." Gambora, supra at 725, citing NAS Report at 139,
141.
                                                                      42


print, if it is to be offered, should be presented as an

opinion, not a fact, and opinions expressing absolute certainty

about, or the infallibility of, an 'individualization' of a

print should be avoided."     Gambora, supra at 729 n.22.

    The defendants contend that the fingerprint expert witness

failed to heed this court's cautionary advice and presented her

findings based on her application of the ACE-V methodology to

latent prints found on the scene as fact rather than opinion.

We agree, but we are persuaded that the testimony did not create

a substantial likelihood of a miscarriage of justice.       Wright,

411 Mass. at 682.

    Fingerprint analysts testifying as expert witnesses must

clearly frame their findings in the form of an opinion to avoid

improper testimony.   See Mass. G. Evid. § 702 & note (2017).

See also Joyner, 467 Mass. at 183 n.9 ("Gambora permits a

fingerprint expert to opine on whether two fingerprints match,"

thus it is "helpful" to ask expert to testify as to his or her

opinion).   Here, the analyst testified that individualization

signifies that the print examiner has "come[] to the conclusion

that there is a sufficient amount of quality and quantity of

those details between the latent print and the known fingerprint

. . . to establish that the latent [print] originated from the

known print or that donor."    She testified on several occasions
                                                                   43


that she individualized fingerprints of the defendants to latent

prints found at the scene of the crime.

    However, portions of the analyst's testimony implicitly

suggested the fallibility of fingerprint analysis.     Contrast

Commonwealth v. Wadlington, 467 Mass. 192, 205 (2014)

(fingerprint analyst improperly testified as to her belief of

"no error rate in [her] area of science").    For example, she

agreed that latent prints are obtained from an "uncontrolled

setting," and that various factors, including pressure, can

affect the way the fingerprint is recorded.   Moreover, as in

Gambora, we note that the vigorous cross-examination of the

analyst countered any possible misconception that

individualization is infallible.   Specifically, defense counsel

for Fulgiam questioned her on her inability to determine when

the latent prints were deposited, and counsel highlighted the

fact that fingerprints are "somewhat delicate."     Defense counsel

for Corbin also questioned her on issues regarding the surface

from which the latent print on the curling iron was taken and

regarding the fact that the latent print recovered is not

"exactly similar" to the known prints.

    Finally, the Commonwealth's evidence linking the defendants

to the crime, separate and apart from the fingerprint evidence,

was strong.   Thus, even though we conclude that the analyst's

testimony regarding individualization was erroneously presented
                                                                     44


as fact, we determine that the error did not create a

substantial likelihood of a miscarriage of justice.

     The defendants also argue that the judge erred in allowing

the analyst to testify that another fingerprint analyst had

reviewed her work.28   According to the defendants, this testimony

amounted to "improper vouching" and hearsay expert testimony.

     We are not persuaded that this testimony was error.     Expert

testimony as to the opinions or conclusions of a second,

nontestifying expert constitutes inadmissible hearsay.     See

Commonwealth v. Whitaker, 460 Mass. 409, 421-422 (2011).     Here,

the judge allowed the analyst's testimony that the other analyst

"reviewed" her work, but did not allow testimony that the second

analyst verified her work.29   The analyst testified as to the

ACE-V process, wherein verification or review by another

fingerprint analyst is a step in the process, and did not

testify as to the second analyst's independent conclusions.      The

     28
       During the analyst's testimony, counsel for Fulgiam
preemptively objected to any questioning by the Commonwealth
regarding whether the analyst's findings were verified by
another fingerprint examiner. While the judge sustained the
objection, the judge indicated that the witness would be allowed
to testify that another fingerprint analyst reviewed her work.
     29
       Despite the judge's ruling prohibiting the Commonwealth
from questioning the analyst regarding whether another analyst
verified her work, following the colloquy, the Commonwealth
questioned whether her work was "verified." After the analyst
testified in the affirmative, Fulgiam objected. The judge
sustained the objection as to the use of the word "verified,"
but reiterated that he would allow the testimony regarding what
the second analyst did when he examined the analyst's findings.
                                                                    45


analyst's testimony stands in stark contrast to the expert

testimony at issue in Whitaker, where the fingerprint analyst

expert witness testified that two secondary analysts "concurred"

with his conclusions regarding individualization.     Id. at 421.

Accordingly, we conclude that the judge did not err in admitting

the fingerprint analyst's testimony confirming that another

fingerprint analyst reviewed her findings.

     Nonetheless, judges must use caution in allowing testimony

regarding the verification step in ACE-V analysis, as

"verifying" suggests that a nontestifying expert concurs with

the testifying expert's conclusion.    Such testimony would be

improper hearsay testimony.    See Commonwealth v. Chappell, 473

Mass. 191, 202 (2015).

     3.    Gang references.   Corbin argues that the Commonwealth

improperly and repeatedly referenced gang affiliation during the

trial, despite the fact that the judge granted Fulgiam's motion

in limine to exclude such references.    This argument has no

merit.    Corbin merely speculates that the jury would conclude

that the defendants were affiliated with gangs based on the

neighborhoods in which the men grew up.30    Additionally, the

prosecutor's closing argument was proper; there was testimony

     30
       During their interviews with detectives, Fulgiam and
Corbin told the detectives that Fulgiam was originally from the
Academy Homes Development in the Roxbury section of Boston,
Corbin was from Humboldt Avenue in Roxbury, and Thomas was from
Heath Street in the Jamaica Plain section of Boston.
                                                                   46


that six or seven men were seen fleeing the victim's apartment

building immediately after the witnesses heard gun shots.    It is

within permissible bounds for the prosecutor to infer that a

"team" of men committed the murders.   There was no error.   See

Commonwealth v. Kozec, 399 Mass. 514, 516-517 (1987).

    4.   Review pursuant to G. L. c. 278, § 33E.   After a full

review of the trial record, we affirm the convictions and

decline to grant extraordinary relief pursuant to G. L. c. 278,

§ 33E.

                                   So ordered.
    LOWY, J. (concurring).    I agree that the ten-print card

qualifies for the business record exception to the rule against

hearsay.    However, I write separately because the card in this

case involves two levels of hearsay:    the ten-print card itself

and the information provided by the individual to fill out the

card.    I believe the court does not precisely address each

level.

    The business records exception to the rule against hearsay

allows information recorded for a business purpose and contained

in a business record in evidence for its truth.    See Mass. G.

Evid. § 803(6)(A) (2017).    This rule includes out-of-court

statements:    if the statement is recorded for a business purpose

and the individual making the statement does so for a business

purpose, the statement is admissible for its truth.    See id.     If

an out-of-court statement contained in a business record is not

made pursuant to a business purpose, it still may be admissible

if the out-of-court statement is recorded for a business purpose

and the statement falls within another hearsay exception or

exclusion.    As the majority points out, an arrestee's legal

obligation does not equate with a business purpose.

    However, I believe that the information provided to fill

out the ten-print card fell within the hearsay exclusion for an

opposing party's statement.    Mass. G. Evid. § 801(d)(2)(a)

(2017).    For the reasons stated by the court, including the
                                                                   2


defendant's legal obligation to provide identifying information,

the totality of the circumstances established a more than

adequate basis for the judge to conclude -- as a preliminary

question of fact on which admissibility depends and as a matter

of conditional relevance -- that Corbin was the individual who

provided the information.   See Mass. G. Evid. § 104(a), (b)

(2017).   The ten-print card was properly admitted because the

information in the ten-print card was admissible under an

exclusion from the rule against hearsay, and the ten-print card

was admissible as a business record.   Mass. G. Evid.

§ 801(d)(2)(A); § 803(6)(A).
