Please cite cases where suspects were served search warrants for CSAM based suspicious behavior alone.
Courts and law enforcement routinely obtain search warrants to seize devices and accounts after electronic service providers submit CyberTip reports to NCMEC or when investigators trace CSAM to an IP ...