STATE OF NEW JERSEY VS. ROBERT G. WHITE (10-17-0636, MORRIS COUNTY AND STATEWIDE) (RECORD IMPOUNDED) ( 2019 )


Menu:
  •                                       RECORD IMPOUNDED
    NOT FOR PUBLICATION WITHOUT THE
    APPROVAL OF THE APPELLATE DIVISION
    This opinion shall not "constitute precedent or be binding upon any court." Although it is posted on the
    internet, this opinion is binding only on the parties in the case and its use in other cases is limited. R. 1:36-3.
    SUPERIOR COURT OF NEW JERSEY
    APPELLATE DIVISION
    DOCKET NO. A-4971-17T4
    STATE OF NEW JERSEY,
    Plaintiff-Respondent/
    Cross-Appellant,
    v.
    ROBERT G. WHITE,
    Defendant-Appellant/
    Cross-Respondent.
    _______________________
    Argued April 9, 2019 – Decided June 5, 2019
    Before Judges Yannotti and Rothstadt.
    On appeal from Superior Court of New Jersey, Law
    Division, Morris County, Indictment No. 10-17-0636.
    Paul E. Zager argued the cause for appellant/cross-
    respondent (Palumbo, Renaud & De Appolonio,
    attorneys; Jeff Thakker, of counsel and on the briefs;
    Anthony N. Palumbo, on the briefs).
    Lila B. Leonard, Deputy Attorney General, argued the
    cause for respondent/cross-appellant (Gurbir S.
    Grewal, Attorney General, attorney; Lila B. Leonard,
    of counsel and on the brief).
    PER CURIAM
    In March 2017, law enforcement officers executed a search warrant at
    defendant's residence in Morristown and seized certain computer devices. The
    court had granted the State's application for the warrant based on information
    that child pornography was being shared on the internet through devices at
    defendant's home. The officers could not gain access to two computer hard
    drives and a computer tower, which were encrypted.
    The State thereafter filed a motion to compel defendant to produce the
    passcodes for, or otherwise decrypt, the devices. Defendant opposed the motion,
    arguing that the compelled disclosure violated his right against self-
    incrimination under the Fifth Amendment to the United States Constitution and
    New Jersey law. He also argued that the State's motion was an improper attempt
    to obtain discovery and not permitted by the court rules.
    The trial court conducted an evidentiary hearing on the State's motion, and
    thereafter entered an order dated May 25, 2018, which granted the State's motion
    as to the hard drives, but denied the motion with regard to the computer tower.
    We thereafter granted defendant's motion for leave to appeal, and the State filed
    a cross-appeal pursuant to Rule 2:3-4(a). For the reasons stated herein, we
    A-4971-17T4
    2
    affirm on defendant's appeal, reverse on the State's cross-appeal, and remand the
    matter to the trial court for further proceedings.
    I.
    The record discloses the following. In September 2016, the Division of
    Criminal Justice (DCJ) in the State's Department of Law and Public Safety
    began investigating individuals who were suspected of sharing images of child
    pornography on the internet. During the investigation, Detective Laura Hurley
    discovered an Internet Protocol (IP) address 1 that was offering to share such
    images with others by utilizing peer-to-peer file sharing networks. Hurley used
    BitTorrent software and downloaded thirty-eight images of child pornography
    from the IP address. DCJ's investigators traced the IP address to defendant's
    home.
    In January 2017, detectives from the Bayonne Police Department (BPD)
    began a separate investigation using similar investigative software to identify an
    IP address that was being used to share images of child pornography with other
    users on the internet. The BPD detectives downloaded hundreds of such images
    1
    An IP address is an identifying number assigned to an internet subscriber by
    the subscriber's service provider. State v. Reid, 
    194 N.J. 386
    , 389 (2008).
    A-4971-17T4
    3
    from this IP address, twenty-four of which depicted child pornography. The
    detectives also traced the IP address to defendant's residence.
    The DCJ learned that the BPD was investigating the same IP address and
    they merged their investigations. The BDP provided Hurley with a disk that
    contained files the BDP had downloaded from the IP address. On March 10,
    2017, the court issued a warrant, which authorized the DCJ to search defendant's
    home in Morristown and "seize evidence pertaining to" crimes related to the
    "distribution and possession of child pornography."
    The warrant stated that the investigators could search and seize "[a]ny and
    all computers, computer systems, computer programs, computer software,
    computer hardware, including central processing units, external storage units,
    flash drives, . . . hard disk drives/units, . . . documentation, passwords and data
    security devices . . . ." The warrant also stated that the investigators could
    "conduct a forensic examination performed by any qualified examiner, whether
    sworn law enforcement or civilian, on scene and later in a recognized laboratory
    environment on all items until such examination is complete."
    On March 17, 2017, the DCJ executed the warrant and searched
    defendant's home. Defendant was home at the time and remained downstairs
    while the investigators searched his home. The DCJ seized a number of devices
    A-4971-17T4
    4
    from defendant's second-floor office, including a Lenovo P500 laptop, an Asus
    computer tower, two external hard drives, a universal serial bus (USB) thumb
    drive, and other peripheral devices.
    At the scene, DCJ Detective Kevin Madore attempted to access the
    contents of the seized devices. The laptop was logged on, so Madore was able
    to access its contents.   To preserve the laptop's data, Madore performed a
    forensic "preview" of the laptop's files and created reports detailing his
    preliminary findings. Madore later completed a "Forensic Analysis Report ."
    In his report, Madore stated that the two external hard drives and the
    computer tower were encrypted and therefore "could not be read." He found,
    however, that the laptop's hard drive contained eighty-two images of suspected
    child pornography. He noted that the laptop was registered to an e-mail address
    with defendant's name.
    Madore also found that the serial number of one of the encrypted external
    hard drives appeared on the laptop's hard drive, which indicated that the external
    hard drive had at some point been connected to the laptop. In addition, the
    laptop contained a link to a "tor browser," which Madore explained is "primarily
    used to gain access to the dark web" and help maintain the user's anonymity
    while browsing on the internet. Madore noted that the "tor browser" contained
    A-4971-17T4
    5
    a "bookmark" to a page titled "The Pedophile's Handbook," which is an internet
    publication that provides adults suggestions on having sex with minors.
    After the search, the DCJ detectives arrested defendant and charged him
    with second-degree endangering the welfare of a child by distributing child
    pornography, in violation of N.J.S.A. 2C:24-4(b)(5)(a)(i), and third-degree
    endangering the welfare of a child by possessing, viewing or controlling child
    pornography, in violation of N.J.S.A. 2C:24-4(b)(5)(b).
    On August 27, 2017, the State filed a motion to compel defendant "to
    provide the passcodes necessary to decrypt" the two external hard drives and the
    computer tower. As we noted previously, defendant opposed the motion. The
    trial court thereafter held an evidentiary hearing on the motion.
    At the hearing, the State presented testimony from Hurley and Madore
    regarding the DCJ's investigation and the execution of the search warrant.
    Hurley testified that when DCJ conducted the search, she read defendant his
    Miranda2 rights and asked defendant for the passcodes to access the encrypted
    devices. Defendant told Hurley he knew the passcodes for the devices, but he
    refused to disclose them because "he did not want [the police] looking through
    his stuff." Madore testified about the information he obtained from the devices,
    2
    Miranda v. Arizona, 
    384 U.S. 436
     (1966).
    A-4971-17T4
    6
    and his inability to gain access to the encrypted external hard drives and tower.
    The State also presented testimony from Detective Ryan Foley of the Somerset
    County Prosecutor's Office, who explained various technical terms for the court.
    On May 25, 2018, the trial court filed a written opinion in which it
    concluded that defendant's act of producing the passcodes to decrypt the devices
    is a testimonial communication for purposes of the Fifth Amendment privilege
    against self-incrimination.   The court noted, however, that the "foregone
    conclusion" principle is a recognized exception to the Fifth Amendment
    privilege. Quoting Fisher v. United States, 
    425 U.S. 391
    , 411 (1976), the court
    stated the act of production does not violate the Fifth Amendment privilege
    against self-incrimination if the facts communicated by the act of production
    "add[] little or nothing to the sum total of the [g]overnment's information."
    The court held that the facts that would be communicated by defendant's
    act of decryption of the hard drives are a "foregone conclusion" that would not
    violate the Fifth Amendment privilege against self-incrimination. The court
    stated that the State had established that it "knows of the existence and location
    of child pornography files on the hard drives, and knows of defendant's custody,
    control and access to the devices."      The court also found that compelled
    A-4971-17T4
    7
    production of the passcodes to the hard drives would not violate defendant's
    privilege against self-incrimination under New Jersey's common law.
    The court held, however, that the State had not presented sufficient
    evidence to satisfy the "foregone conclusion" exception with regard to the
    computer tower. The court found that the State had not shown that it has
    "knowledge of the existence and location of child pornography on the tower."
    The court also found that the State had not shown defendant had exclusive
    possession or control of the tower, since the forensic examination revealed there
    were three "user profiles" associated with the tower.
    The court memorialized its decision in an order dated May 25, 2018,
    which granted the State's motion to compel production of the passcodes to the
    external hard drives, but denied the motion with regard to the computer tower.
    This appeal and the State's cross-appeal followed.
    On appeal, defendant argues:
    [POINT I]
    THE STATE EXECUTED THE WARRANT AND
    FILED ITS CHARGES, AND [DEFENDANT'S]
    DISCOVERY OBLIGATIONS AT THAT JUNCTURE
    (IF ANY) WERE GOVERNED BY THE COURT
    RULES; THE STATE LACKED LEGAL GROUNDS
    FOR FILING A MOTION TO COMPEL
    DISCLOSURE FROM [DEFENDANT].
    A-4971-17T4
    8
    [POINT II]
    THE DETECTIVES' ASSUMPTIONS ABOUT WHAT
    THE LAPTOP'S VIRTUAL DRIVES[] ONCE
    CONTAINED (AND THEIR ASSUMPTIONS
    ABOUT THE ASSOCIATION OF THE TOSHIBA
    HARD DRIVES WITH THE VIRTUAL DRIVES) DID
    NOT MAKE THE CONTENT OF THE HARD
    DRIVES A "FOREGONE CONCLUSION"; THE
    COMPELLED DISCLOSURE WAS (AND IS) IN
    VIOLATION   OF     [DEFENDANT'S]  FIFTH
    AMENDMENT RIGHTS.
    [POINT III]
    PASSWORD DISCLOSURE SHOULD BE ALSO
    EXCLUDED IN THE CONTEXT OF NEW JERSEY'S
    SELF-INCRIMINATION/PRIVACY PRIVILEGE.
    In response to defendant's arguments, and in support of its cross -appeal,
    the State argues:
    [POINT I]
    BECAUSE DEFENDANT ADMITTED HE KNOWS
    THE PASSWORDS TO HIS ELECTRONIC
    DEVICES, THIS COURT SHOULD [AFFIRM THE
    TRIAL     COURT'S  ORDER    COMPELLING]
    DEFENDANT TO USE THOSE PASSWORDS TO
    DECRYPT ALL OF HIS DEVICES.
    [POINT II]
    IT IS A FOREGONE CONCLUSION THAT
    DEFENDANT      POSSESSES      CHILD
    PORNOGRAPHY ON HIS LAPTOP AND HARD
    DRIVES.
    [POINT III]
    THE SEARCH WARRANT, DATED MARCH 10,
    2017, AUTHORIZED THE STATE TO SEIZE AND
    A-4971-17T4
    9
    SEARCH        DEFENDANT'S         ENCRYPTED       HARD
    DRIVES.
    II.
    The trial court filed its opinion and order on the State's motion before this
    court decided State v. Andrews, 
    457 N.J. Super. 14
     (App. Div. 2018), leave to
    appeal granted,    N.J.    (2019). In Andrews, the defendant appealed from an
    order, which required him to disclose personal identification numbers and
    passcodes for his iPhones. 
    Id. at 18
    . The defendant argued that the compelled
    disclosure of this information violated his right against self-incrimination under
    the Fifth Amendment, and the protections afforded against self-incrimination
    under New Jersey law. 
    Ibid.
    We rejected the defendant's arguments and affirmed the order requiring
    disclosure of the passcodes. 
    Id. at 18
    . In our opinion, we noted that the Fifth
    Amendment privilege against self-incrimination applies to verbal and written
    communications as well as to the production of documents because "[t]he act of
    product[ion]" may communicate incriminating statements. 
    Id. at 22
     (alteration
    in original) (quoting Fisher, 
    425 U.S. at 410
    ).
    We noted, however, that the "foregone conclusion" principle is an
    exception to the "act of production" doctrine. 
    Ibid.
     (citing Fisher, 
    425 U.S. at 411
    ). We stated that the exception applies when the State establishes with
    A-4971-17T4
    10
    "reasonable particularity" (1) that it has "knowledge of the existence of the
    evidence demanded"; (2) that defendant has "possession and control of that
    evidence"; and (3) that the evidence is authentic. 
    Id.
     at 22-23 (citing United
    States v. Hubbell, 
    530 U.S. 27
    , 30, 40-41 (2000)). We stated that "when an
    accused implicitly admits the existence and possession of evidence, the accused
    has 'add[ed] little or nothing to the sum total' of the information the government
    has, and the information provided is a 'foregone conclusion.'"          Id. at 23
    (alteration in original) (quoting Fisher, 
    425 U.S. at 411
    ).
    We held that the "foregone conclusion" exception applied to the
    compelled disclosure of the defendant's passcodes. Id. at 23-24. We determined
    that the testimonial aspects of the act of producing the passcodes are a "foregone
    conclusion" because the State had established that the defendant "exercised
    possession, custody, or control" of the phones, and the fact that defendant knows
    the passcodes "adds little or nothing to the sum total of the [g]overnment's
    information." Id. at 24 (quoting Fisher, 
    425 U.S. at 411
    ).
    We stated that the act of disclosing the passcodes did "not convey any
    implicit factual assertions about the 'existence' or 'authenticity' of the data on
    the device[s]." Id. at 23. We also stated that the State had described with
    "reasonable particularity" the evidence it was seeking, "which is the passcodes
    A-4971-17T4
    11
    to the phones." Id. at 24. We observed that the defendant had argued that the
    State had not shown that it knew of the possible contents on the devices, but
    held that this was immaterial because the court had ordered the defendant to
    disclose the passcodes, not the contents of the phones unlocked by those
    passcodes. Id. at 23.
    Here, the trial court determined that for the "foregone conclusion"
    exception to apply, the State had to establish, among other things, that it had
    sufficient knowledge of the existence and location of child pornography files on
    the hard drives and tower. Under Andrews, however, the State need only show
    with "reasonable particularity" the knowledge of the existence of the evidence,
    that defendant has possession and control of that evidence, and that the evidence
    is authentic. Id. at 22-23.
    The evidence that the State sought in this case is the passcodes, not the
    contents of the external hard drives or computer tower. As we explained in
    Andrews, the facts implicitly conveyed by the act of disclosing the passcodes
    are that the defendant knows the passcodes, and that the defendant had
    possession, custody, and control of the devices encrypted with those passcodes.
    Ibid.
    A-4971-17T4
    12
    Moreover, in the opinion, the trial court commented that the State had to
    prove defendant had exclusive possession of the tower. The court noted there
    were two other user profiles for the tower. However, in Andrews, we did not
    state that the "foregone conclusion" exception would only apply if the defendant
    has exclusive possession and control of the encrypted devices. The State has to
    prove defendant has possession and control of the encrypted devices, not
    exclusive possession and control.
    Therefore, for the reasons stated in Andrews, we conclude the trial court
    correctly determined that the "foregone conclusion" exception applied to the
    passwords to the external hard drives, but erred by finding that the exception did
    not apply to the computer tower. We conclude the State presented sufficient
    evidence for the application of the exception to all three devices.
    III.
    On appeal, defendant argues that the evidence presented at the hearing
    does not support the trial court's finding that he acknowledged he knew the
    passcodes to the external hard drives and the computer tower. Defendant asserts
    that, when Hurley questioned him at the time of the search, she asked if he knew
    the password for his "computer." Defendant asserts that Hurley asked him about
    a password for "one unspecified computer," not any other devices.
    A-4971-17T4
    13
    Defendant's argument is not supported by the record. At the hearing,
    Hurley was asked if she requested defendant to provide the password to his
    "computers" and she replied, "Yes, I did." She further testified that defendant
    would not provide "his password" because "he did not want" the detectives
    "looking through his stuff."     The trial court did not err by interpreting
    defendant's statements to be an acknowledgement that he knew the pass words
    to all of his computer devices, including the external hard drives and the
    computer tower.
    Defendant also suggests that Hurley elicited his statements about the
    passcodes in violation of his rights under Miranda. At the hearing, defendant
    objected to Hurley's testimony on the ground that the court had not yet
    conducted a Miranda hearing. The court decided to take testimony on whether
    defendant was informed of his rights under Miranda, and whether he had waived
    those rights.
    Hurley then testified that she read defendant his Miranda rights, and he
    did not invoke those rights. Hurley further testified that the detectives did not
    arrest defendant before she questioned him about the passwords. She also said
    that she did not threaten defendant or make any promises to induce him to make
    the statements about the passcodes.
    A-4971-17T4
    14
    In its opinion, the trial court found the testimony established that Hurley
    read defendant his Miranda rights before he made his statements. The court
    found there was no evidence of compulsion and defendant was not under arrest
    at the time he made his statements. We must defer to the trial court's findings
    of facts where, as here, they are "supported by sufficient credible evidence in
    the record." State v. Brown, 
    216 N.J. 508
    , 538 (2014) (quoting State v. Elders,
    
    192 N.J. 224
    , 246 (2007)).
    Defendant further argues that the State did not present sufficient evidence
    to show with "reasonable particularity" that there were images of child
    pornography on defendant's two external hard drives. As we noted previously,
    under Andrews, the focus of the analysis for application of the "foregone
    conclusion" exception is the facts implicitly conveyed by the disclosure of the
    passcodes, not the content of the devices encrypted with those passcodes.
    Andrews, 457 N.J. Super. at 24. Therefore, we need not address defendant's
    argument.
    IV.
    Defendant further argues that the trial court's order compelling him to
    produce the passcodes or otherwise decrypt the external hard drives violates his
    right against self-incrimination under New Jersey law. As noted, the trial court
    A-4971-17T4
    15
    rejected defendant's contention that the State's common law privilege against
    self-incrimination precludes the court from requiring defendant to provide his
    passcodes or otherwise decrypt the external hard drives.
    The court stated that New Jersey's right against self-incrimination did not
    employ the decryption of defendant's devices. The court noted that defendant
    may generally have a right "to a private enclave where he may lead a private
    life," but he does not have the right to a "private enclave" replete "with images
    of child exploitation."
    We agree with the trial court's analysis, which applies not only to the
    external hard drives, but also to the computer tower. We reject defendant's
    argument that the court's order violates his privilege against self-incrimination
    under New Jersey law substantially for the reasons stated in Andrews. Id. at 30-
    34.
    V.
    Defendant further argues that our court rules do not authorize the State to
    seek an order compelling him to produce the passcodes or otherwise decrypt the
    external hard drives and computer tower. He contends that by seeking to compel
    him to produce the passcodes months after it seized the devices, the State is
    improperly engaging in discovery, rather than the actions to execute the search
    A-4971-17T4
    16
    warrant. Defendant's arguments lack sufficient merit to warrant discussion. R.
    2:11-3(e)(2).
    We note, however, that in this case, the DCJ obtained a search warrant,
    which authorized it to search for and seize evidence of child pornography in
    defendant's home, including computers, computer hardware, hard drives,
    computer storage media, and peripheral devices. The warrant also authorized
    the DCJ to conduct forensic examination "on scene and later in a recognized
    laboratory environment on all items until such examination is complete."
    As explained previously, in executing the warrant, the DCJ found and
    seized defendant's encrypted external hard drives and computer tower.
    Defendant admitted he owned the devices and knew the passcodes, but refused
    to provide the passwords or decrypt the devices. The State thereafter moved to
    compel decryption. In doing so, the State was not engaged in discovery. It was
    seeking information that would allow it to complete the forensic examination of
    the devices seized, which was specifically authorized by the warrant.
    The record shows that the State sought the passcodes so that it could
    complete the search authorized by the warrant. The State was not attempting to
    conduct a "new and separate search" and its effort to complete the search was
    "reasonable under the totality of the circumstances." State v. Hai Kim Nguyen,
    A-4971-17T4
    17
    
    419 N.J. Super. 413
    , 427 (App. Div. 2011) (quoting State v. Finesmith, 
    406 N.J. Super. 510
    , 519 (App. Div. 2009), and United States v. Keszthelyi, 
    308 F.3d 557
    , 569 (6th Cir. 2002)).
    Accordingly, we affirm on defendant's appeal, reverse on the State's cross-
    appeal, and remand the matter for further proceedings consistent with this
    opinion. We do not retain jurisdiction.
    A-4971-17T4
    18
    

Document Info

Docket Number: A-4971-17T4

Filed Date: 6/5/2019

Precedential Status: Non-Precedential

Modified Date: 8/20/2019