The Legal Intelligencer
December 12, 2019
Last month, the Pennsylvania Supreme Court ruled that it is
a violation of the Fifth Amendment’s protection against self-incrimination to
compel a defendant to disclose a password to allow police access to a “lawfully
seized, but encrypted, computer.”
In 2015, the attorney general’s office was conducting an
investigation into the use and distribution of child pornography. The attorney
general sought a search warrant for Joseph J. Davis’ home after his IP address
was linked to child pornography videos and a file-sharing network. Davis
admitted to watching child pornography, and law enforcement officials lawfully
seized his computer. However, he refused to provide the 64-character password
to his computer.
According to the court record, the entire hard drive of the
computer was encrypted and “there was no data that could be read without
opening the TrueCrypt volume.”
Agents could only confirm that there was “Windows on the
computer and the TrueCrypt,” and no knowledge of any specific files other than
the operating system files.
Davis was charged with two counts of disseminating child
pornography in violation of 18 Pa.C.S. Section 6312(c), and two counts of
criminal use of a communication facility in violation of 18 Pa.C.S. Section
7512(a).
The commonwealth sought a court order to compel Davis to
reveal his password. Davis invoked his Fifth Amendment right against
self-incrimination. The Fifth Amendment to the U.S. Constitution guarantees a
defendant the right not to incriminate himself. That means individuals cannot
be forced to make statements, or testify, against their self-interest.
Luzerne County Court of Common Pleas Judge Tina Gartley
focused on whether turning over the password would be testimonial.
The Fifth Amendment protects communication by defendants
that is “testimonial.” The trial court opined that “the touchstone of whether
an act of production is testimonial is whether the government compels the
individual to use ‘the contents of his own mind to explicitly or implicitly communicate
some statement of fact.’”
The trial court then turned to the “foregone conclusion”
exception to the Fifth Amendment. In Fisher v. United States, 425 U.S. 391
(1976), the U.S. Supreme Court established the rationale underlying the
foregone conclusion doctrine. The court ruled that an act of production does
not involve testimonial communication if the facts conveyed are already known
to the government, such that the individual “adds little or nothing to the sum
total of the government’s information.” Since Davis admitted to watching child
pornography videos and that he is the sole owner of the computer, the trial
court held that the exception applied. The Superior Court affirmed.
The case made its way to the Pennsylvania Supreme Court in
May. Prosecutors argued that, “The commonwealth does not seek the password to
establish or prove a connection between Davis, his computer and its contents
because it already has that information. It merely seeks surrender of the
password in order to open the lock that Davis has placed on the computer to
avoid a lawful search.”
The Supreme Court acknowledged that “at times,
constitutional privileges are an impediment to the commonwealth—requiring the
commonwealth to do the heavy lifting, indeed, to shoulder the entire load, in
building and bringing a criminal case without a defendant’s assistance may be
inconvenient and even difficult.”
That difficult burden is no reason to circumvent the rights
and privileges afforded an accused by the U.S. Constitution.
The Supreme Court concluded that compelling the disclosure
of a password to a computer, that is, the act of production, is testimonial.
Revealing a computer password is a verbal communication, not merely a physical
act that would be nontestimonial in nature. There is no physical manifestation
of a password, unlike a hand writing sample, blood draw or a voice exemplar. As
a password is necessarily memorized, one cannot reveal a password without
revealing the contents of one’s mind.
In 1990, Justice John Paul Stevens wrote in a dissent
in Doe v. United States, 487 U.S. 201 (1990), “A defendant can be
compelled to produce material evidence that is incriminating. Fingerprints,
blood samples, voice exemplars, handwriting specimens or other items of
physical evidence may be extracted from a defendant against his will.” Stevens
continued, “but can he be compelled to use his mind to assist the prosecution
in convicting him of a crime? I think not. He may in some cases be forced to
surrender a key to a strongbox containing incriminating documents, but I do not
believe he can be compelled to reveal the combination to his wall safe—by word
or deed.”
In 2000, the Supreme Court decided United States v.
Hubbell, 530 U.S.23 (2000) involving an issue of Fifth Amendment privilege for
a defendant who became intertwined in the “Whitewater” witch hunt targeting
Bill and Hillary Clinton. The court explained why a grand jury subpoena
requiring a man to assemble self-incriminating documents was improper:
It was unquestionably necessary for the respondent to make
extensive use of “the contents of his own mind” in identifying the hundreds of
documents responsive to the requests in the subpoena. … The assembly of those
documents was like telling an inquisitor the combination to a wall safe, not
like being forced to surrender the key to a strongbox.
The Pennsylvania Supreme Court borrowed the metaphor raised
in Doe and Hubbell to emphasize its holding. A footnote to
the opinion contained the following passage, “Indeed, a password to a computer
is, by its nature, intentionally personalized and so unique as to accomplish
its intended purpose―keeping information contained therein confidential and
insulated from discovery. Here, under U.S. Supreme Court precedent, we find
that the commonwealth is seeking the electronic equivalent to a combination to
a wall safe—the passcode to unlock the appellant’s computer. The commonwealth
is seeking the password, not as an end, but as a pathway to the files being
withheld.”
In the 27-page majority opinion, Commonwealth of
Pennsylvania v. Davis, 56 MAP 2018, Nov. 20, 2019, written by Justice
Deborah Todd, the high court acknowledged “the significant and ever-increasing
difficulties faced by law enforcement in light of rapidly changing technology,
including encryption.”
However she wrote, “This constitutional right is firmly
grounded in the realization that the privilege, while sometimes ‘a shelter to
the guilty,’ is often ‘protection to the innocent.’”
Matthew T. Mangino is of counsel with Luxenberg,
Garbett, Kelly & George. His book “The Executioner’s Toll, 2010″ was
released by McFarland Publishing. Contact him at www.mattmangino.com,
matthewmangino@aol.com and follow him on Twitter @MatthewTMangino).
To visit the Column CLICK HERE
No comments:
Post a Comment