FIRST DISTRICT COURT OF APPEAL
STATE OF FLORIDA
_____________________________
No. 1D18-4572
_____________________________
MATTHEW TYLER POLLARD,
Petitioner,
v.
STATE OF FLORIDA,
Respondent.
_____________________________
Petition for Writ of Prohibition—Original Jurisdiction.
June 20, 2019
MAKAR, J.
To what extent does the Fifth Amendment right against self-
incrimination protect a suspect in a criminal case from the
compelled disclosure of a password to an electronic
communications device in the state’s possession? Courts differ in
their legal analysis of this question, resulting in no consensus in
state and federal courts; indeed, different approaches currently
exist between two Florida appellate courts on the topic. In this
case, we conclude that the proper legal inquiry on the facts
presented is whether the state is seeking to compel a suspect to
provide a password that would allow access to information the
state knows is on the suspect’s cellphone and has described with
reasonable particularity.
Matthew Tyler Pollard was arrested and charged with armed
robbery of two victims who were misled into believing they were
buying drugs. Pursuant to a warrant, the state seized an iPhone®
from Pollard’s car and filed a motion to compel Pollard to disclose
the phone’s passcode so that it could access broad categories of
encrypted information on the cellphone. The information sought
was described in general terms and broad categories in the
investigating detective’s affidavit in support of the search warrant:
• Call/text/communication history on and between
June 19, 2018 and June 25, 2018.
• Content of communications on and between June 19,
2018 and June 25, 2018.
• Picture(s) of narcotics, money, firearms.
• Written information about the illegal purchase,
possession, and sale of illegal narcotics, and or plans
of a robbery on and between June 19, 2018 and June
25, 2018.
• Activity listed in phone applications: Facebook,
Facebook Messenger, etc., concerning buying, selling,
or possessing illegal narcotics and or planning a
robbery on and between June 19, 2018 and June 25,
2018.
The affidavit did not state the existence or content of any
specific text, picture, call or other particular information. It noted,
however, that “it was reasonable to believe” that a co-defendant,
Draven Rouse, had “communicated with Pollard via cell phone”
both prior to and on the day of the robbery, presumably to
coordinate the robbery. Based on his training and experience, the
detective stated that persons in “criminal enterprises” sometimes
use cellphones to communicate and coordinate activities with
accomplices, to document criminal activities, and to compile
contacts useful in a criminal investigation; he did not, however,
identify any specific item that was on Pollard’s cellphone, only that
the state wished to seize from the cellphone all items in the
categories of information listed above.
Accessing the cellphone’s content required a passcode, which
the state in a one-page motion sought to compel from Pollard. The
state’s motion—and the trial court’s favorable ruling—relied
2
exclusively on State v. Stahl,
206 So. 3d 124 (Fla. 2d DCA 2016),
which upheld the compelled production of a cellphone’s passcode
over a defendant’s Fifth Amendment objection that doing so
violated his right not to testify as to the “contents of his mind,” i.e.,
knowledge of the passcode itself. The trial court relied on Stahl,
even though it arose in another district and (as discussed later)
involved different facts, because no other Florida court had
weighed in on the general topic at that time. Pardo v. State,
596
So. 2d 665, 666 (Fla. 1992) (“in the absence of interdistrict conflict,
district court decisions bind all Florida trial courts.”).
Based on Stahl, the trial court held the state established that
the cellphone was Pollard’s, that it was password protected, and
that if the password compelled from Pollard made the cellphone’s
content accessible, the password was deemed authentic, thereby
requiring Pollard to provide the password. Quoting Stahl, the trial
court also noted that the state had established by independent
means the “‘existence, possession, and authenticity of the
documents’ it seeks to recover from [Pollard’s] phone.” 206 So. 3d
at 135. It concluded that the “State already knows the information
it is seeking [Pollard] to produce and why.” The trial court did not
identify any specific documents or information in this regard, but
noted that “at [a] minimum, text messages” were part of the
coordinated effort to conduct the robbery. No limits were placed on
the scope of the search of the contents of the cellphone, but the
state was prohibited from using the compelled production of
Pollard’s password as evidence at trial; no limitation was put on
use of the documents and information that might be discovered.
The password was placed in a sealed and confidential file pending
resolution of Pollard’s petition for writ of prohibition, which seeks
to prevent the compelled use of the embargoed password. We treat
the petition as a petition for writ of certiorari, which requires a
departure from the essential requirements of the law that results
in material injury that cannot be corrected post-judgment. Art. V,
§ 4(b)(3), Fla. Const. (2019); Stahl, 206 So. 3d at 129; Grant v.
State,
832 So. 2d 770, 771 (Fla. 5th DCA 2002).
Courts nationwide are struggling to find common legal ground
on the constitutionality of compelled password production under
the Fifth Amendment and its application in specific cases. U.S.
Const. amend. V. (“No person . . . shall be compelled in any
3
criminal case to be a witness against himself”); see also Art. I, § 9,
Fla. Const. (2019) (same); see generally Marjorie A. Shields, Fifth
Amendment Privilege Against Self-Incrimination as Applied to
Compelled Disclosure of Password or Production of Otherwise
Encrypted Electronically Stored Data,
84 A.L.R. 6th 251 (2019)
(compiling Fifth Amendment cases involving “compelled disclosure
of an individual's password, means of decryption, or unencrypted
copy of electronically stored data.”).
The Fifth Amendment forbids a governmentally-compelled
testimonial communication (or act) that tends to incriminate the
communicator (or actor). In re Grand Jury Subpoena Duces Tecum
Dated March 25, 2011,
670 F.3d 1335, 1341 (11th Cir. 2012). “The
touchstone of whether an act of production is testimonial is
whether the government compels the individual to use ‘the
contents of his own mind’ to explicitly or implicitly communicate
some statement of fact.
Id. at 1345 (quoting Curcio v. United
States,
354 U.S. 118, 128 (1957)). Forcing a defendant to disclose a
password, whether by speaking it, writing it down, or physically
entering it into a cellphone, compels information from that
person’s mind and thereby falls within the core of what constitutes
a testimonial disclosure. In this case, Pollard was compelled to act
in a testimonial manner by disclosing a password known only in
his mind. In this type of password compulsion case, the law is
unsettled as to whether a “foregone conclusion” exception might
apply, i.e., where the government knows that identifiable
documents exist under a defendant’s control such that obtaining
them via a compelled disclosure of a password is a mere formality
and thereby non-testimonial. The Supreme Court has approved
the exception’s use but not in the context of a compelled passcode
disclosure. See G.A.Q.L., 257 So. 3d at 1066 (Fla. 4th DCA 2018)
(“The Supreme Court has applied the foregone conclusion
exception only when the compelled testimony has consisted of
existing evidence such as documents.”) (Kuntz, J., concurring in
result).
Florida is no exception in the national judicial debate over
compelled password production. Since the trial court’s ruling, the
Fourth District issued its opinion in G.A.Q.L. v. State,
257 So. 3d
1058, 1062 (Fla. 4th DCA 2018), which seemingly conflicts with
the approach taken in Stahl as to the foregone conclusion
4
exception and allows compelled production of information where
the testimonial value of doing so is negligible. As a result, two
different analytical methods currently exist in Florida, though
both apply the same two-step framework, which asks (a) is the
compelled production of the password a testimonial and
potentially incriminating act, and, if so, (b) is the compelled
password production nonetheless permissible under the foregone
conclusion exception because its testimonial value is
inconsequential due to the state already knowing of the existence
of the requested information. Id. at 1063 (“Under this exception,
an act of production is not a violation of the Fifth Amendment—
even if it conveys a fact—if the state can show with reasonable
particularity that, at the time it sought to compel the act of
production, it already knew of the materials sought, thereby
making any testimonial aspect a foregone conclusion.”); Stahl, 206
So. 3d at 135 (“That is, by implicitly admitting the existence of the
evidence requested and that it is in the accused's possession the
accused ‘adds little or nothing to the sum total of the Government's
information’; the information provided is a foregone conclusion.”)
(quoting Fisher v. United States,
425 U.S. 391, 411 (1976) (“The
existence and location of the [tax-preparation] papers are a
foregone conclusion” such that taxpayer’s compelled production of
them “adds little or nothing to the sum total of the Government's
information by conceding that he in fact has the papers. Under
these circumstances by enforcement of the summons ‘no
constitutional rights are touched. The question is not of testimony
but of surrender.’”)) (citation omitted); see generally Fern L.
Kletter, Construction and Application of "Foregone Conclusion"
Exception to Fifth Amendment Privilege against Self-
Incrimination, 25 A.L.R. Fed. 3d Art. 10 (2017) (compiling cases
that discuss the foregone conclusion exception).
For example, if the central feature in a criminal case is what
files are on a cellphone, and the state can establish that a
defendant’s cellphone contains files that are described with
“reasonable particularity,” the compelled production of the
password to access those files (but only those files) does no damage
to the defendant’s constitutional right against self-incrimination
where sufficient evidence establishes that it is his phone on which
the files reside. In contrast, if a central feature of a criminal case
is who owns a seized cellphone or has the code to access it,
5
compelling a defendant to provide a password may be testimonial
and incriminating because it proves an unknown fact, i.e., who is
the cellphone’s owner or who can access it. For instance, if an
employee was alleged to have broken into a password protected
computer system, and caused cyber-harm therein, evidence as to
his ability to access the system (i.e., possession of the password)
would be incriminating because it supports the ability to access the
system.
In Stahl, a video voyeurism case, the defendant used a
cellphone to take video under a customer’s skirt, was identified via
store surveillance video, and arrested. After his locked cellphone
was produced pursuant to a search warrant, he admitted it was his
cellphone and initially agreed to permit police to search it for
images, but he changed his mind, resulting in the state’s request
to compel its password. Under those circumstances, the Second
District concluded that compulsion of the passcode was not a Fifth
Amendment violation under the foregone conclusion exception.
The three-part test for the foregone conclusion exception requires
that the state “must show with reasonable particularity that, at
the time it sought the act of production, it already knew the
evidence sought existed, the evidence was in the possession of the
accused, and the evidence was authentic.” Stahl, 206 So. 3d at 135
(citing In re Grand Jury Subpoena,
670 F.3d at 1344 (“Where the
location, existence, and authenticity of the purported evidence is
known with reasonable particularity, the contents of the
individual's mind are not used against him, and therefore no Fifth
Amendment protection is available.”) (footnote omitted).
Stahl’s application of foregone conclusion exception focused on
disclosure of the password itself, rather than the information that
access to the cellphone would produce. Stahl viewed the forced
disclosure of the password as non-testimonial because the
existence, custody, and authenticity of the password were a
“foregone conclusion” under the facts of that case. No one disputed
that the cellphone was the defendant’s and that he put it under a
customer’s skirt with its flash enabled and appeared to take
pictures that would be accessible in the cellphone’s memory (or via
cloud storage). The testimonial value of compelling the cellphone’s
password was negligible under the circumstances: it was Stahl’s
phone, evidence established his use of the phone during the
6
incident for flash-photography, and he initially agreed to allow
police to search the phone, thereby inferring his knowledge of the
passcode and its authenticity. By its holding, Stahl stands for the
proposition that where the state establishes factually that it knows
that a password existed, that the suspect possesses or controls the
password, and that the suspect’s actions disclosed or authenticated
the password sought (here by Stahl initially agreeing to allow
police to access the phone), it is a foregone conclusion to force its
disclosure. A similar result arose in State v. Johnson, WD 80945,
2019 WL 1028462 (Mo. Ct. App. Mar. 5, 2019), which involved
compelled production of a passcode by a defendant who had
previously entered it into his phone in the presence of government
actors.
The facts conveyed through his act of producing the
passcode were the existence of the passcode, his
possession and control of the phone’s passcode, and the
passcode’s authenticity. The State showed that it had
prior knowledge of those facts because Johnson
knowingly and voluntarily entered the passcode the
first time in the presence of law enforcement and
defense counsel for the purpose of having his expert
examine the phone; hence, their disclosure a second
time pursuant to the order to compel was a foregone
conclusion.
Id. at *14 (footnote omitted). Because the defendant had already
openly used the passcode in the manner described, the “compelled
act of production was not testimonial” and not a Fifth Amendment
violations. Id.
Unlike Stahl and Johnson, the decision in G.A.Q.L was not
based on application of the foregone conclusion exception to
unearth a passcode about which the state had prior knowledge via
its open use by the suspect (Johnson) or the suspect’s initial
agreement to disclose it (Stahl). Instead, G.A.Q.L. focused on the
state’s goal of accessing the information on the suspect’s cellphone
because the state lacked prior knowledge of the suspect’s
password. In Stahl, the court noted that the state sought “the
phone passcode not because it wants the passcode itself, but
because it wants to know what communications lie beyond the
7
passcode wall.” G.A.Q.L., 257 So. 3d at 1062. The court in G.A.Q.L.
concluded that compelling the passcode was akin to a testimonial
act (i.e., revealing the “contents of the mind” of the minor)
protected by the Fifth Amendment. It rejected Stahl’s analysis
under the foregone conclusion exception, applying the three-part
test to the information sought rather than the passcode. Id. at 1063
(“It is critical to note here that when it comes to data locked behind
a passcode wall, the object of the foregone conclusion exception is
not the password itself, but the data the state seeks behind the
passcode wall.”). In rejecting Stahl’s password-centric approach,
the court said that to do “otherwise would expand the contours of
the foregone conclusion exception so as to swallow the protections
of the Fifth Amendment.” Id. It pointed out that under the
approach in Stahl “every password-protected phone would be
subject to compelled unlocking since it would be a foregone
conclusion that any password-protected phone would have a
passcode. That interpretation is wrong and contravenes the
protections of the Fifth Amendment.” Id. *
The application of Stahl is inconsistent with protection of a
defendant’s right against self-incrimination in situations where a
defendant has not given up his testimonial privilege in the
* Judge Kuntz concurred in the result, noting that the
“foregone conclusion exception is a judicially created exception” to
the Fifth Amendment with limited application to compelled
production of documents. G.A.Q.L., 257 So. 3d at 1066 (Kuntz, J.,
concurring in result). His conclusion, that “the foregone conclusion
doctrine cannot apply to compelled oral testimony,” is based on the
principle that forcing an “accused to orally communicate to the
government information maintained only in his mind would
certainly compel oral testimony.” Id. His bright-line approach is
appealing and has the virtue of consistency with the intent of the
Founders to protect against surrendering incriminating evidence
before or at trial. See Donald Dripps, Self-Incrimination, in THE
HERITAGE GUIDE TO THE CONSTITUTION 437-439 (David F. Forte &
Matthew Spalding eds., 2d ed. 2014) (noting that the Supreme
Court in the 1880s “took the view that the privilege protected
private books and papers” but has since “changed significantly”
Fifth Amendment doctrine.).
8
password itself. Unlike the situations in Stahl and Johnson, no
evidence establishes that Pollard had previously given up his
privilege in the password sought. In these situations, as the court
in G.A.Q.L. noted, the three-part test is tautological when applied
to passwords because all password-protected cellphones have an
“authentic” password, making the Stahl test somewhat circular. In
this regard, the court in Stahl said that “[i]f the phone or computer
is accessible once the passcode or key has been entered, the
passcode or key is authentic,” 206 So. 3d at 136, which begs the
question of whether sufficient evidence established that the
passcode is authentic before it had been compelled and used
successfully. The state must have sufficient proof of authenticity
before it can compel the password’s production; simply because a
compelled password unlocks a cellphone after the fact doesn’t
make it authentic ex ante. To do otherwise is “like telling an
inquisitor the combination to a wall safe, not like being forced to
surrender the key to a strongbox.” United States v. Hubbell,
530
U.S. 27, 43 (2000).
The approach in Stahl makes sense, however, in those limited
situations where the state establishes that the testimonial value
of the compelled password has been abandoned, such as where a
defendant has voluntarily entered his passcode to access his
cellphone in the presence of law enforcement such that the
testimonial value of compelling the passcode’s production a second
time is negligible. Johnson,
2019 WL 1028462, at *14 (state
showed that defendant “knowingly and voluntarily entered the
passcode the first time in the presence of law enforcement and
defense counsel for the purpose of having his expert examine the
phone; hence, their disclosure a second time pursuant to the order
to compel was a foregone conclusion.”). We note that it becomes
predominantly a Fourth Amendment issue, not a Fifth
Amendment one, in such cases as to the scope of what the state is
allowed access in using the compelled password.
Turning back to G.A.Q.L., that court held that “if the state can
meet the requirements of the foregone conclusion exception, it may
compel otherwise ostensibly self-incriminating testimonial
production of information.” 257 So. 3d at 1063.
9
Under this exception, an act of production is not a
violation of the Fifth Amendment—even if it conveys a
fact—if the state can show with reasonable particularity
that, at the time it sought to compel the act of production,
it already knew of the materials sought, thereby making
any testimonial aspect a foregone conclusion. . . . As it
pertains to electronic files, this doctrine requires that the
state demonstrate with reasonable particularity “that (1)
the file exists in some specified location, (2) the file is
possessed by the target of the subpoena, and (3) the file
is authentic.”
Id. (citing In re Grand Jury Subpoena,
670 F.3d at 1349 n.28). In
applying the three-part test, the court concluded that the state
failed to identify with reasonable particularity any specific files
sought on the minor’s cellphone. It noted that “the state's subpoena
fails to identify any specific file locations or even name particular
files that it seeks from the encrypted, passcode-protected phone.
Instead, it generally seeks essentially all communications, data,
and images on the locked iPhone.” G.A.Q.L., 257 So. 3d at 1064
(emphasis added). At best, the prosecutor at a hearing said a
surviving passenger had been communicating with the minor via
Snapchat and text message on the day of the accident and after the
accident, but it held that “this stand-alone statement is not enough
to meet the ‘reasonable particularity’ requirement of the foregone
conclusion exception.” Id. “It is not enough for the state to infer
that evidence exists—it must identify what evidence lies beyond
the passcode wall with reasonable particularity.” Id. The court in
G.A.Q.L. therefore concluded that the foregone conclusion
exception was not met.
We agree with the Fourth District that unless the state can
describe with reasonable particularity the information it seeks to
access on a specific cellphone, an attempt to seek all
communications, data and images “amount[s] to a mere fishing
expedition.” Id. On the assumption that the foregone conclusion
exception applies to core testimonial communications, such as a
compelled oral disclosure of a password, it is not applicable here
because the state failed to identify with particularity and certainty
what information existed beyond the password-protected
cellphone wall; mere inference that evidence may exist is not
10
enough. In re Grand Jury Subpoena,
670 F.3d at 1347 (“Case law
from the Supreme Court does not demand that the Government
identify exactly the documents it seeks, but it does require some
specificity in its requests—categorical requests for documents the
Government anticipates are likely to exist simply will not
suffice.”).
Applied here, the state’s generalized requests for multiple
categories of communications, pictures, and social media activity
fit the description of net cast far too broadly. The only category of
information that potentially meets the reasonable particularity
standard is the investigating officer’s affidavit, which avers only
that “it is reasonable to believe” that a co-defendant had
“communicated with Pollard via cell phone” leading up to and on
the day the robbery occurred. The basis for this belief is that
because the co-defendant had sent text messages to another person
involved in the robbery, it would be reasonable to believe that the
co-defendant must have communicated with Pollard in a similar
manner as well, even though no specific communication is
identified or alleged. As in G.A.Q.L., the evidentiary record is too
thin to conclude that the foregone conclusion exception applies. At
best, the officer believed that text messages likely existed on
Pollard’s phone because most criminal enterprises of this type
operate via coordinated electronic communications that would
leave a discoverable digital trail, but this generalized belief falls
short of the reasonable particularity standard. See Hubbell,
530
U.S. at 45 (government’s deficient identification of particular
documents sought cannot be cured by “the overbroad argument
that a businessman such as [Hubbell] will always possess general
business and tax records that fall within the broad categories
described in this subpoena.”).
In conclusion, we grant the writ of certiorari and quash the
trial court’s order.
PETITION GRANTED; ORDER QUASHED
JAY, J., concurs; WINOKUR, J., dissents with opinion.
11
_____________________________
Not final until disposition of any timely and
authorized motion under Fla. R. App. P. 9.330 or
9.331.
_____________________________
WINOKUR, J., dissenting.
The Fifth Amendment’s Self-Incrimination Clause, the
relevant provision here, “provides: ‘No person ... shall be compelled
in any criminal case to be a witness against himself’” and, at its
core, “is a prohibition on compelling a criminal defendant to testify
against himself at trial.” United States v. Patane,
542 U.S. 630, 637
(2004) (quoting amend. V, U.S. Const.). Upon compulsion, an “act
of producing evidence” that is incriminating could have
“communicative aspects” sufficient to implicate the Fifth
Amendment, but this is not the case when the evidence the state
seeks to compel production of is a “foregone conclusion” known by
the state, eliminating its testimonial worth. Fisher v. United
States,
425 U.S. 391, 410-11 (1976). In holding that the Fifth
Amendment bars the state from compelling an accused to produce
the password to his cell phone—where he does not dispute the
existence of the password or his knowledge of it—the majority
conflates Fifth Amendment jurisprudence with the protections
provided in the Fourth Amendment, 1 which is not at issue. I would
deny relief.
I.
Matthew Pollard was arrested and charged, along with co-
defendants, with armed robbery. The state proved to the trial court
1 “The Fourth Amendment protects ‘[t]he right of the people to
be secure in their persons, houses, papers, and effects, against
unreasonable searches and seizures,’” Carpenter v. United States,
138 S. Ct. 2206, 2213 (2018), and was purposed “to safeguard the
privacy and security of individuals against arbitrary invasions by
governmental officials,”
id. (quoting Camara v. Mun. Court of City
& Cty. of San Francisco,
387 U.S. 523, 528 (1967)).
12
that Pollard participated in the robbery and provided the firearm,
and that he and the co-defendants planned the robbery through
text messages. The state sought a search warrant for Pollard’s
phone, asserting probable cause that the phone contained
incriminating evidence, which the trial court issued and Pollard
unsuccessfully challenged. After seizing Pollard’s phone, law
enforcement was unable to access its contents without his passcode
and the state filed a motion to compel him to produce it. Pollard
objected, arguing that production of the password could not be
severed from production of the data inside the phone (which is
what the state truly sought) and the state has not adequately
identified the data in the phone for the “foregone conclusion”
exception to apply. The trial court found that the phone belonged
to Pollard, he knew its passcode, and it could not be accessed
without the passcode—none of which was disputed—and granted
the motion to compel pursuant to State v. Stahl,
206 So. 3d 124
(Fla. 2d DCA 2016). The trial court ordered Pollard to provide his
passcode, ruled that the state could not use his production of the
passcode as evidence at trial, and allowed the passcode he provided
to be sealed pending our review.
II.
The Fifth Amendment “applies only when the accused is
compelled to make a Testimonial Communication that is
incriminating.” Fisher,
425 U.S. at 408; see also Doe v. United
States,
487 U.S. 201, 207 (1988) (finding that compliance would be
compelled and incriminating, thus the only question is whether it
would be a “testimonial communication”). Here, the parties do not
dispute that disclosure of the passcode is being compelled or that
it would be incriminating. The question at issue is whether
Pollard’s act of producing his password is a testimonial
communication.
Testimonial Communication
“[I]n order to be testimonial, an accused’s communication
must itself, explicitly or implicitly, relate a factual assertion or
disclose information.” Doe,
487 U.S. at 210. For this reason,
compelled acts that do not require an accused to disclose his
knowledge—such as furnishing a blood sample, providing a voice
or handwriting exemplar, or standing in a lineup—are not
13
testimonial and are not protected by the Fifth Amendment.
Id. at
210-11 (collecting cases). Whether a particular compelled
communication is testimonial “depend[s] on the facts and
circumstances” of the particular case. Fisher,
425 U.S. at 410.
The Fourth District in G.A.Q.L. v. State,
257 So. 3d 1058,
1061-62 (Fla. 4th DCA 2018), found that disclosing a password “is
testimonial and can violate the Fifth Amendment privilege against
compelled self-incrimination” because the “very act of revealing a
password asserts a fact: that the defendant knows the password.”
But see Stahl, 206 So. 3d at 133-34 (finding that disclosure of the
password was not testimonial because the password was not itself
significant or an acknowledgment of the incriminating evidence
found on the phone). Generally, I agree that when an accused
provides a passcode to a cell phone, he engages “in a testimonial
act utilizing the ‘contents of his mind’ and demonstrating as a
factual matter that he knows how to access the phone.” G.A.Q.L.,
257 So. 3d at 1062. Pollard’s production of his password is
testimonial in that it shows that he has control over the phone and
can access its contents, an incriminating fact if the phone contains
plans for committing an armed robbery.
Foregone Conclusion
While production of the password may generally be
testimonial, the Fifth Amendment may not bar compulsion if the
state already knows of the testimonial aspect of the
communication. In Fisher, the Supreme Court considered whether
compelled production implicated the Fifth Amendment. Even if the
act of production would include testimonial self-incrimination, the
Court held that compelled production was permissible because the
existence and location of the evidence was known to the
Government, or was a “foregone conclusion.”
425 U.S. at 411.
“Under these circumstances by enforcement of the summons ‘no
constitutional rights are touched. The question is not of testimony
but of surrender.’”
Id. (quoting In re Harris,
221 U.S. 274, 279
(1911)).
Under this exception, an act of production is not a
violation of the Fifth Amendment—even if it conveys a
fact—if the state can show with reasonable particularity
that, at the time it sought to compel the act of production,
14
it already knew of the materials sought, thereby making
any testimonial aspect a foregone conclusion.
G.A.Q.L., 257 So. 3d at 1063.; see also United States v. Apple
MacPro Computer,
851 F.3d 238, 247 (3d Cir. 2017), cert. denied
sub nom. Doe v. United States,
138 S. Ct. 1988 (2018) (“[T]he Fifth
Amendment does not protect an act of production when any
potentially testimonial component of the act of production—such
as the existence, custody, and authenticity of evidence—is a
‘foregone conclusion’ that ‘adds little or nothing to the sum total of
the Government's information.’” (quoting Fisher,
425 U.S. at 411)).
In contrast, compelling the production of incriminating evidence
(which implicitly admits existence and possession) violated the
Fifth Amendment where the state’s demand was akin to a
“detailed written interrogatory or a series of oral questions at a
discovery deposition,” characterized “as a ‘fishing expedition.’”
United States v. Hubbell,
530 U.S. 27, 36, 41-42 (2000).
Here, the state’s only demand of Pollard is to produce his
passcode. The state is not asking him to recover or retrieve any
files that might exist on his phone. Because production of the
passcode is the only communication the state seeks, this is where
the analysis must be focused. See Stahl, 206 So. 3d at 136 (holding
that the relevant question is whether the state “has established
that it knows with reasonable particularity that the passcode
exists, is within the accused’s possession or control, and is
authentic”); Apple MacPro Computer, 851 F.3d at 248 n.7 (“[A] very
sound argument can be made that the foregone conclusion doctrine
properly focuses on whether the Government already knows the
testimony that is implicit in the act of production. In this case, the
fact known to the government that is implicit in the act of
providing the password for the devices is ‘I, John Doe, know the
password for these devices.’”); State v. Johnson, No. WD80945,
2019 WL 1028462, at *14 (Mo. Ct. App. Mar. 5, 2019) (“The focus
of the foregone conclusion exception is the extent of the State’s
knowledge of the existence of the facts conveyed through the
compelled act of production. Here, Johnson was ordered to produce
the passcode to his phone. The facts conveyed through his act of
producing the passcode were the existence of the passcode, his
possession and control of the phone’s passcode, and the passcode’s
authenticity.”).
15
Before the trial court, the state proved—and Pollard
conceded—that the phone belonged to Pollard, that he had control
over it, and that he knew the passcode to unlock it. Thus, the facts
making this communication implicitly “testimonial” are not in
dispute, but are a foregone conclusion. 2 See Com. v. Gelfgatt,
11
N.E.3d 605, 615 (Mass. 2014) (“The facts that would be conveyed
by the defendant through his act of decryption—his ownership and
control of the computers and their contents, knowledge of the fact
of encryption, and knowledge of the encryption key—already are
known to the government and, thus, are a ‘foregone conclusion.’”). 3
2 Unlike compelling one to produce documents, requiring
someone to produce a passcode to unlock a cell phone does not
implicate a question of authenticity. See State v. Stahl,
206 So. 3d
124, 136 (Fla. 2d DCA 2016) (“[W]e must recognize that the
technology is self-authenticating—no other means of
authentication may exist. If the phone or computer is accessible
once the passcode or key has been entered, the passcode or key is
authentic.” (citation omitted)); Com. v. Gelfgatt,
11 N.E.3d 605, 616
n.14 (Mass. 2014) (“Here, the defendant’s decryption of his
computers does not present an authentication issue analogous to
that arising from a subpoena for specific documents because he is
not selecting documents and producing them, but merely entering
a password into encryption software.”).
3 See also State v. Andrews,
197 A.3d 200, 207 (N.J. Super. Ct.
App. Div. 2018), leave to appeal granted, No. 082209,
2019 WL
2011594 (N.J. May 3, 2019) (“[D]efendant’s Fifth Amendment right
against self-incrimination is not violated by requiring him to
disclose the passcodes for his iPhones, which the State lawfully
possessed. The act of producing the passcodes has testimonial
aspects because defendant is acknowledging ownership,
possession, and control of the devices. He is also acknowledging he
has the ability to access the contents of the phone. However, by
producing the passcodes, defendant is not implicitly conveying any
information the State does not already possess. Defendant is not
telling the government something it does not already know.
Therefore, the implicit facts conveyed by the act of producing the
passcodes is a ‘foregone conclusion’ and compelled disclosure of the
passcodes does not violate defendant’s Fifth Amendment right
against self-incrimination.”); Commonwealth v. Davis,
176 A.3d
16
The question is not whether Pollard knows the password, but
whether he must surrender it, see Fisher,
425 U.S. at 411, so the
Fifth Amendment’s protection against self-incrimination does not
apply.
III.
G.A.Q.L. focused on the contents of the phone when
determining whether the testimony is a foregone conclusion. 257
So. 3d at 1063 (“[T]he object of the foregone conclusion exception is
not the password itself, but the data the state seeks behind the
passcode wall.”). The majority now follows suit. 4 In this view, “it is
not enough to know that a passcode wall exists, but rather, the
state must demonstrate with reasonable particularity that what it
is looking for is in fact located behind that wall” because “the
‘evidence sought’ in a password production case such as this is not
the password itself; rather, it is the actual files or evidence on the
869, 876 (Pa. Super. Ct. 2017), appeal granted,
195 A.3d 557 (Pa.
2018) (citing, inter alia, Apple MacPro Computer and Gelfgatt and
agreeing that the “appellant’s act of providing the password in
question is not testimonial in nature and his Fifth Amendment
right against self-incrimination would not be violated” where the
appellant admitted that he knew the password to the computer).
4 The majority asserts that the “password-centric approach”
“makes sense . . . where the state establishes that the testimonial
value of the compelled password has been abandoned, such as
where a defendant has voluntarily entered his passcode to access
his cellphone in the presence of law enforcement such that the
testimonial value of compelling the passcode’s production a second
time is negligible,” and such a situation “becomes predominantly a
Fourth Amendment issue, not a Fifth Amendment one[.]” Maj. op.
at 8-9. This distinction is without a difference as applied to this
case. If the analysis is properly focused on the accused’s knowledge
of the passcode when he has entered it in the presence of law
enforcement previously, there is no reason it should be centered
elsewhere when the accused simply admits that he knows it and
can enter it.
17
locked phone.” Id. at 1063-64. 5 Thus, G.A.Q.L. holds, the state
must identify with reasonable particularity the evidence on the
phone to compel an accused to produce his password. Id. at 1064.
It is true that the state does not seek the passcode for itself,
but as a means to access the files in the phone. This, however, does
not change what the accused is being compelled to produce. See,
e.g., State v. Andrews,
197 A.3d 200, 205 (N.J. Super. Ct. App. Div.
2018), leave to appeal granted, No. 082209,
2019 WL 2011594 (N.J.
May 3, 2019) (“Defendant argues the State is unaware of all of the
possible contents of defendant’s devices. This is immaterial
because the order requires defendant to disclose the passcodes, not
the contents of the phones unlocked by those passcodes.”). In no
other context does the foregone-conclusion analysis focus on
evidence other than the evidence being compelled, and there is no
reason to shift the focus now.
G.A.Q.L. is correct that the state must identify with
particularity the files on the phone it seeks. But when these files
are not what the state is compelling production of, the Fifth
Amendment is not implicated. The Fifth Amendment does not
“protect[] private information obtained without compelling self-
incriminating testimony[.]” Fisher,
425 U.S. at 400. “Insofar as
private information not obtained through compelled self-
incriminating testimony is legally protected, its protection stems
from other sources” such as “the Fourth Amendment’s protection
5 G.A.Q.L. drew on the analysis in In re Grand Jury Subpoena
Duces Tecum Dated March 25, 2011,
670 F.3d 1335, 1349 (11th
Cir. 2012), which found that the government failed to prove that it
“knew to any degree of particularity what, if anything, was hidden
behind the encrypted wall.” However, the Eleventh Circuit also
found that the government did not show “any basis, let alone
shown a basis with reasonable particularity, for its belief that
encrypted files exist on the drives, that [the accused] has access to
those files, or that he is capable of decrypting the files.”
Id. In
contrast, the state here had probable cause that the phone
contained incriminating text messages, from which it obtained a
warrant to seize the phone, and showed that the phone belonged
to Pollard and that he knew the passcode to unlock it.
18
against seizures without warrant or probable cause,” the First
Amendment’s protection against being compelled to disclose who
you associate with, “or evidentiary privileges such as the attorney-
client privilege.” Id. at 401.
The state’s obligation to describe with particularity the files it
seeks is required because the “Fourth Amendment by its terms
requires particularity in the [search] warrant[.]” Groh v. Ramirez,
540 U.S. 551, 557 (2004); see also Massachusetts v. Sheppard,
468
U.S. 981, 988 n.5 (1984) (“The uniformly applied rule is that a
search conducted pursuant to a warrant that fails to conform to
the particularity requirement of the Fourth Amendment is
unconstitutional.”). Here, as in G.A.Q.L., the validity of the search
warrant and the Fourth Amendment are not at issue.
The Fourth Amendment protected Pollard’s phone from
search and seizure until a search warrant issued. Whether Pollard
must produce the passcode to his phone—enabling the state to
search and seize what is already entitled to—depends on whether
that compelled act is testimonial and self-incriminating. Here, the
only testimonial aspect of the production—Pollard’s ownership and
control of the phone—is undisputed and a foregone conclusion. The
Fifth Amendment, contrary to the analysis of the majority and the
Fourth District in G.A.Q.L., does not provide any further quasi-
Fourth-Amendment protections where the state is not compelling
production of the phone or data on it and the state possesses a valid
search warrant for the phone. 6 See United States v. Spencer, No.
17-Cr-00259-CRB-1,
2018 WL 1964588, at *3 (N.D. Cal. Apr. 26,
6 The Supreme Court explained the issue of privacy in relation
to the Fourth and Fifth Amendments in Fisher,
425 U.S. at 400:
The Framers addressed the subject of personal
privacy directly in the Fourth Amendment. They struck
a balance so that when the State’s reason to believe
incriminating evidence will be found becomes sufficiently
great, the invasion of privacy becomes justified and a
warrant to search and seize will issue. They did not seek
in still another Amendment the Fifth to achieve a general
protection of privacy but to deal with the more specific
issue of compelled self-incrimination.
19
2018) (“To the extent Spencer contends that the government has
not adequately identified the files it seeks” in the devices it
compelled him to decrypt, “that is an issue properly raised under
the Fourth Amendment, not the Fifth.”). 7
IV.
In this case, we do not need to determine whether the state
can sufficiently describe the evidence it seeks on the phone because
the state has not compelled Pollard to produce that evidence and
the Fourth Amendment is not at issue. Pollard argues that he may
not be compelled to produce the passcode to his cell phone due to
the Fifth Amendment’s Self-Incrimination Clause, but this
argument fails where the testimonial component of the
communication is undisputed. I would deny Pollard’s petition for
writ of certiorari.
_____________________________
Stacy A. Scott, Public Defender, and Logan P. Doll, Assistant
Public Defender, Gainesville, for Petitioner.
Ashley Moody, Attorney General, and Benjamin L. Hoffman,
Assistant Attorney General, Tallahassee, for Respondent.
7 We need not decide whether the state may compel an accused
to disclose his passcode orally or in writing. Several authorities
have distinguished whether the state may “compel the defendant
to disclose -- whether orally or in writing -- the actual password, as
opposed to cases requiring merely physically entering it into the
device.” Commonwealth v. Jones,
117 N.E.3d 702, 710 n.9 (Mass.
2019); see also G.A.Q.L., 257 So. at 1061-62 (Kuntz, J., concurring
in result) (concluding “that the foregone conclusion doctrine cannot
apply to compelled oral testimony”). Here, Pollard does not
distinguish between the act of entering the passcode and
disclosure of the passcode orally or in writing. Instead, he argues
that the passcode and phone data are so intertwined that the
proper inquiry concerns the state’s knowledge of the data on the
phone. As stated above, I disagree with this position.
20