Commonwealth v. Davis, J., Aplt. ( 2019 )


Menu:
  •                              [J-42-2019] [MO: Todd, J.]
    IN THE SUPREME COURT OF PENNSYLVANIA
    MIDDLE DISTRICT
    COMMONWEALTH OF PENNSYLVANIA,                  :   No. 56 MAP 2018
    :
    Appellee                  :   Appeal from the Order of the Superior
    :   Court at No. 1243 MDA 2016 dated
    :   November 30, 2017, Reconsideration
    v.                               :   denied February 5, 2018, Affirming the
    :   Order of the Luzerne County Court of
    :   Common Pleas, Criminal Division, at
    JOSEPH J. DAVIS,                               :   Nos. CP-40-CR-291-2016 and CP-40-
    :   MD-11-2016 dated June 30, 2016
    Appellant                 :
    :   ARGUED: May 14, 2019
    DISSENTING OPINION
    JUSTICE BAER                                             DECIDED: November 20, 2019
    I respectfully dissent from the majority’s decision, which holds that the foregone
    conclusion exception to the Fifth Amendment privilege against self-incrimination does not
    apply to the compelled disclosure of a computer password because the password
    manifests from one’s mind. I further disagree with the majority’s alternative holding that
    if the foregone conclusion exception would apply under the circumstances presented, the
    Commonwealth failed to satisfy the requisites thereof because it did not establish that it
    had knowledge of the various files stored on Appellant’s computer hard drive in addition
    to the single previously identified file that contained child pornography.
    Preliminarily, I acknowledge that the issue presented in this appeal is one of first
    impression, with which courts across the nation have struggled. See generally Marjorie
    A. Shields, Fifth Amendment Privilege Against Self-Incrimination as Applied to Compelled
    Disclosure of Password or Production of Otherwise Encrypted Electronically Stored Data,
    
    84 A.L.R. 6th 251
     (2019) (compiling Fifth Amendment cases involving “compelled
    disclosure of an individual’s password, means of decryption, or unencrypted copy of
    electronically stored data”). Upon review of the High Court’s seminal decision in Fisher
    v. United States, 
    425 U.S. 391
     (1976), which first recognized the foregone conclusion
    exception, and its progeny, I would hold that the foregone conclusion analysis applies to
    the compelled disclosure of a password to an electronic device, which the Commonwealth
    has seized pursuant to a warrant.
    My analysis focuses on the compulsion order, which directed Appellant to “supply
    the Commonwealth with any and all passwords used to access” a specific desktop
    computer and hard drive seized from his residence. Trial Court Order, 6/30/2016. In my
    view, this order compels an act of production that has testimonial aspects in that it
    conveys, as a factual matter, that Appellant has access to the particular computer seized
    by the Commonwealth pursuant to a warrant, and that he has possession and control
    over the password that will decrypt the encrypted files stored on that computer. As
    discussed in detail infra, because the Commonwealth was already aware of these facts
    based upon its own investigation and Appellant’s candid discussion with government
    agents, the password falls within the foregone conclusion exception to the Fifth
    Amendment privilege against self-incrimination, and may be constitutionally compelled.
    Notably, critical to my position is the recognition that this case does not involve a Fourth
    Amendment challenge based upon Appellant’s privacy rights in his encrypted computer
    files but, rather, solely a challenge to the compelled disclosure of his password based
    upon his Fifth Amendment privilege against self-incrimination.
    I. The Fifth Amendment As Applied To Acts of Production
    As noted by the majority, the Fifth Amendment provides, in relevant part, that “[n]o
    person . . . shall be compelled in any criminal case to be a witness against himself.” U.S.
    [J-42-2019] [MO: Todd, J.] - 2
    CONST. amend V. Courts have interpreted the privilege as protecting a citizen “from being
    compelled to testify against himself, or otherwise provide the State with evidence of a
    testimonial or communicative nature.” Pennsylvania v. Muniz, 
    496 U.S. 582
    , 588-89
    (1990) (citations omitted). The Fifth Amendment “does not independently proscribe the
    compelled production of every sort of incriminating evidence but applies only when the
    accused is compelled to make a testimonial communication that is incriminating.” Fisher,
    
    425 U.S. at 408
    .      To be testimonial, a communication must either “explicitly or
    implicitly . . . relate a factual assertion or disclose information.” Doe v. United States,
    
    487 U.S. 201
    , 210 (1988).
    In Fisher, the High Court explained that in addition to traditional testimony, acts of
    production may implicate the Fifth Amendment because the “act of producing evidence
    in response to a subpoena nevertheless has communicative aspects of its own, wholly
    aside from the contents of the papers produced.” 
    425 U.S. at 410
    . The Court explained
    that compliance with a request for evidence “tacitly concedes” the existence of the
    evidence, possession or control of the evidence by the individual, and the belief that the
    evidence is, in fact, the item requested by the government. 
    Id.
     Whether the act of
    production has a testimonial aspect sufficient to warrant Fifth Amendment protection
    “depends on the facts and circumstances of particular cases or classes thereof.” 
    Id.
    It is well established that some compelled acts have no testimonial aspects and,
    thus, no Fifth Amendment protection, as the acts do not require an accused to relate a
    factual assertion, disclose knowledge, or “speak his guilt.” Doe v. United States, 
    487 U.S. 201
    , at 210-11 (1988). These include, for example, furnishing a blood sample, providing
    a voice or handwriting exemplar, or standing in a line-up. 
    Id.
     (collecting cases). Other
    compelled acts, such as the production of certain subpoenaed documents, may have a
    compelled testimonial aspect warranting Fifth Amendment protection where the
    [J-42-2019] [MO: Todd, J.] - 3
    government’s demand is akin to a “detailed written interrogatory or a series of questions
    at a discovery deposition,” characterized as a “fishing expedition.” United States v.
    Hubbell, 
    530 U.S. 27
    , 36, 41-42 (2000).1
    Finding that an act of production has testimonial aspects, however, does not
    necessarily mean that the Fifth Amendment privilege precludes compulsion of the
    evidence sought. As the majority cogently observes, the United States Supreme Court
    has found that information, otherwise testimonial in nature, is unprotected where the
    production of such information is a foregone conclusion. Majority Opinion at 20. The
    foregone conclusion exception applies where the existence and location of the compelled
    evidence “adds little or nothing to the sum total of the government’s information.” Fisher,
    
    425 U.S. at 410
    . The High Court in Fisher explained that a foregone conclusion exists
    where “[t]he question is not of testimony but of surrender.” 
    Id. at 411
     (quoting In re Harris,
    
    221 U.S. 274
    , 279 (1911)).       Thus, as the majority recognizes, “what is otherwise
    testimonial in nature is rendered non-testimonial, as the facts sought to be compelled are
    a foregone conclusion.” Majority Opinion at 21.
    In my opinion, the compulsion of Appellant’s password is an act of production,
    requiring him to produce a piece of evidence similar to the act of production requiring one
    to produce a business or financial document, as occurred in Fisher.2 See Trial Court
    Order, 6/20/2016 (directing Appellant to “supply the Commonwealth with any and all
    1 In Hubbell, the Supreme Court held that the act of producing thousands of subpoenaed
    documents had testimonial aspects in that the act of production communicated
    information about the documents’ existence, custody, and authenticity. The High Court
    concluded that, unlike in Fisher, the government had shown no prior knowledge of either
    the existence or whereabouts of the documents, thus, the foregone conclusion exception
    to the Fifth Amendment privilege against self-incrimination did not apply.
    2 The summonses in Fisher directed the defendants’ attorneys to produce documents
    relating to the defendants’ tax returns in connection with an investigation into possible
    civil or criminal liability under federal income tax laws.
    [J-42-2019] [MO: Todd, J.] - 4
    passwords used to access the HP Envy 700 desktop computer with serial #
    MXX4100000042C containing Seagate 2 TB hard drive with serial # Z4Z1AAAEFM”). An
    order compelling disclosure of the password, here a 64-character password, has
    testimonial attributes, not in the characters themselves, but in the conveyance of
    information establishing that the password exists, that Appellant has possession and
    control of the password, and that the password is authentic, as it will decrypt the encrypted
    computer files. The Commonwealth is not seeking the 64-character password as an
    investigative tool, as occurred in Hubbell, where the government compelled the disclosure
    of thousands of documents to engage in a fishing expedition to discover evidence of the
    defendant’s guilt. To the contrary, the Commonwealth already possesses evidence of
    Appellant’s guilt, which it set forth in an affidavit of probable cause to obtain a warrant to
    search Appellant’s computer.       Stated differently, the Commonwealth is not asking
    Appellant to “speak his guilt,” but merely to allow the government to execute a warrant
    that it lawfully obtained.
    Because I view the compulsion order as requiring the “surrender” of Appellant’s
    password to decrypt his computer files, I would apply Fisher’s act-of-production test. The
    majority declines to apply the foregone conclusion rationale to the compelled disclosure
    of Appellant’s computer password, finding that to do so would constitute a “compulsion of
    one’s mental processes” in violation of the Fifth Amendment. Majority Opinion at 22.
    There is appeal to this conclusion, as requiring Appellant to supply his password involves
    some mental effort in recalling the 64 characters used to encrypt the computer files. 3
    3 I recognize that the majority’s conclusion in this regard finds support in commentary
    found in federal cases, suggesting a constitutional distinction between the compelled
    surrender of a key and the compelled disclosure of a combination to a wall safe. For the
    reasons set forth herein, however, I do not find any such distinction dispositive in a case
    involving current day technology relating to the compelled disclosure of a password to
    encrypted digital information, where the Commonwealth has a warrant to search the
    [J-42-2019] [MO: Todd, J.] - 5
    However, one would expend similar mental effort when engaging in virtually any other act
    of production, such as the disclosure of business or financial records, as the individual
    must retrieve the contents of his mind to recall the documents’ location before disclosing
    them to the government. Under the majority’s reasoning, the compelled production of
    documents would be tantamount to placing the defendant on the stand and requiring him
    to testify as to the location of the documents sought. The mere fact that Appellant is
    required to think in order to complete the act of production, in my view, does not immunize
    that act of production from the foregone conclusion rationale.
    II. Application of the Foregone Conclusion Test
    Having determined that the foregone conclusion rationale may potentially apply to
    cases involving the compelled disclosure of a computer password, significant questions
    arise regarding how to administer the three-part test. As observed by the majority, to
    satisfy the foregone conclusion exception to the Fifth Amendment privilege, “the
    government must establish its knowledge of: (1) the existence of the evidence demanded;
    (2) the possession or control of the evidence by the defendant; and (3) the authenticity of
    the evidence.” Majority Opinion at 21.
    As an alternative holding, the majority opines that if the Court were to find that the
    foregone conclusion exception could apply to the compelled disclosure of a password, it
    would apply Fisher’s act-of-production test to the computer files stored on Appellant’s
    computer. See Majority Opinion at 25 n.9 (holding that “because the Commonwealth has
    failed to establish that its search is limited to the single previously identified file [containing
    child pornography], and has not asserted that it is a foregone conclusion as to the
    existence of additional files that may be on the computer, which would be accessible to
    digital container. Only the High Court can make the final determination in this regard for
    purposes of the Fifth Amendment, and the present case offers an attractive vehicle by
    which the Court could do so.
    [J-42-2019] [MO: Todd, J.] - 6
    the Commonwealth upon Appellant’s compelled disclosure of the password, we find the
    Commonwealth has not satisfied the foregone conclusion exception”).
    Respectfully, it is my position that the foregone conclusion exception as applied to
    the facts presented relates not to the computer files, but to the password itself.
    Appellant’s computer files were not the subject of the compulsion order, which instead
    involved only the password that would act to decrypt those files. This change of focus is
    subtle, but its effect is significant. While the government’s knowledge of the specific files
    contained on Appellant’s computer hard drive would be central to any claim asserted
    pursuant to the Fourth Amendment, the same is not dispositive of the instant claim based
    upon the Fifth Amendment right against self-incrimination, which focuses upon whether
    the evidence compelled, here, the password, requires the defendant to provide
    incriminating, testimonial evidence.     See Doe v. United States (In re Grand Jury
    Subpoena), 
    383 F.3d 905
    , 910 (9th Cir. 2004) (providing that “it is the government’s
    knowledge of the existence and possession of the actual documents [subpoenaed by the
    government], not the information contained therein, that is central to the foregone
    conclusion inquiry”).    This Court should not alleviate concerns over the potential
    overbreadth of a digital search in violation of Fourth Amendment privacy concerns by
    invoking the Fifth Amendment privilege against self-incrimination, which offers no privacy
    protection. The High Court in Fisher made this point clear by stating, “We cannot cut the
    Fifth Amendment loose from the moorings of its language, and make it serve as a general
    protector of privacy – a word not mentioned in its text and a concept directly addressed
    in the Fourth Amendment.” 
    425 U.S. at 401
     (quoting United States v. Nobles, 
    422 U.S. 225
    , 233 n.7 (1975) (emphasis in original)).
    Accordingly, I would align myself with those jurisdictions that examine the
    requisites of the foregone conclusion exception by focusing only on the compelled
    [J-42-2019] [MO: Todd, J.] - 7
    evidence itself, i.e., the computer password, and not the decrypted files that the password
    would ultimately reveal. See, e.g., United States v. Apple MacPro Computer, 
    851 F.3d 238
    , 248 n.7 (3rd Cir. 2017) (“[A] very sound argument can be made that the foregone
    conclusion doctrine properly focuses on whether the Government already knows the
    testimony that is implicit in the act of production. In this case, the fact known to the
    government that is implicit in the act of providing the password for the device is ‘I, John
    Doe, know the password for these devices.’”); State v. Johnson, 
    576 S.W.3d 205
    , 277
    (Mo. Ct. App. 2019) (holding that the focus of the foregone conclusion exception as
    applied to the compelled entering of one’s cell phone passcode is the extent of the
    government’s knowledge about the existence of the passcode, his possession and control
    of the phone’s passcode, and the passcode’s authenticity); Commonwealth v. Gelfgatt,
    
    11 N.E.3d 605
    , 615 (Mass. 2014) (holding that the compelled decryption of computer files
    satisfied the elements of the foregone conclusion exception because the government
    already knew the implicit facts conveyed through the act of entering the encryption key,
    such as the defendant’s ownership and control of the computers, knowledge of the
    encryption, and knowledge of the encryption key); State v. Andrews, 
    197 A.3d 200
    , 205
    (N.J. Super. 2018) (holding that whether the government was aware of the possible
    contents of the defendant’s cell phones was immaterial “because the order requires
    defendant to disclose the passcodes, not the contents of the phones unlocked by those
    passcodes”).
    III. Application to Future Cases
    Finally, it is my belief that the majority’s approach could render inconsistent results
    as the determination of whether there was a Fifth Amendment violation in compelled
    decryption cases could depend upon the type of password that the individual employed
    to protect his encrypted files. For example, according to the majority, if the accused used
    [J-42-2019] [MO: Todd, J.] - 8
    a multi-character password to encrypt computer files, as occurred here, and the
    government compelled the individual to supply the password, a Fifth Amendment violation
    would result because the password manifests through the use of one’s mind. Majority
    Opinion at 23. However, if the individual employed a biometric password, such as facial
    recognition or a fingerprint, the majority’s analysis would arguably lose its force. Under
    those circumstances, the individual is not using the contents of his mind but, rather, is
    performing a compelled act of placing his finger or face in the appropriate position to
    decrypt the files. Additional questions arise when the act of compulsion is not the
    disclosure of the password itself, but the entry of the password into the computer. It is
    my position that all these examples constitute acts of production that would be subject to
    the foregone conclusion rationale in the appropriate case. The same legal analysis
    should apply to the underlying act of compelled decryption of digital information when the
    government has obtained a warrant to search the digital container. To hold to the contrary
    would create an entire class of evidence, encrypted computer files, that is impervious to
    governmental search.     This could potentially alter the balance of power between
    governmental authorities and criminals, and render law enforcement incapable of
    accessing relevant evidence.
    IV. Conclusion
    Accordingly, I would hold that the foregone conclusion exception to the Fifth
    Amendment privilege against self-incrimination applies to render non-testimonial
    Appellant’s compelled act of producing the password to his encrypted, lawfully seized
    computer. As the majority observes, when government agents attempted to execute the
    search warrant, Appellant voluntarily informed them that he was the sole user of the
    computer, that he used hardwired Internet services that were password protected, that
    [J-42-2019] [MO: Todd, J.] - 9
    only he knew the password to decrypt his computer files, and that he would never disclose
    the password, as it would incriminate him.
    In addition to Appellant’s voluntary disclosure to government agents that he knew
    the password that would decrypt the files stored on the computer that the Commonwealth
    lawfully seized, there is ample circumstantial evidence demonstrating Appellant’s
    knowledge of the password. Before seizing the computer, government agents conducted
    an investigation of the “eMule” peer-to-peer network to identify internet users sharing child
    pornography. Agents made a direct connection with a device that used a particular IP
    address over the eMule network, which agents subsequently linked to Appellant. Using
    this direct connection, agents downloaded one child pornography video file from
    Appellant’s IP address. Affidavit of Probable Cause, 10/20/2015, at 7. Based on this
    download, the agents obtained the search warrant for Appellant’s residence. Id. at 9.
    Upon executing the search warrant, agents seized a single desktop computer, as
    that was the only device connected to Appellant’s IP address. N.T., 1/14/2016, at 33.
    Forensic analysis revealed that Appellant’s IP address had used the eMule file-sharing
    program on 23 dates from July 4, 2015, through October 19, 2015, to share files indicative
    of child pornography. Affidavit of Probable Cause, 10/20/2015, at 10-11; N.T., 1/14/2016,
    at 29. Agent Daniel Block explained that the government reached this conclusion based
    upon the “SHA value,” which is essentially a “digital fingerprint” that corresponds with
    known SHA values of child pornography files. N.T., 1/14/2016, at 20. This evidence
    demonstrates that Appellant possessed the password to decrypt files on the computer
    seized by the Commonwealth, as his own words established that he was the sole user of
    the computer and forensic analysis demonstrated that he was accessing the encrypted
    files on the days leading up to his arrest.
    [J-42-2019] [MO: Todd, J.] - 10
    Under these circumstances, it was a foregone conclusion that the government
    knew that the password to decrypt the files existed, that Appellant had exclusive control
    over the password, and that the password was authentic.4 Accordingly, the testimonial
    aspects of the password disclosure “adds little or nothing to the sum total of the
    government’s information.” Fisher, 
    425 U.S. at 410
    . Thus, I would find that the compelled
    disclosure of Appellant’s password does not violate his Fifth Amendment privilege against
    self-incrimination.
    Justices Dougherty and Mundy join this dissenting opinion.
    4 I would hold that the authenticity prong of the foregone conclusion exception requires
    the government to establish that the compelled information is what it purports to be, i.e.,
    a password that will decrypt the computer files on Appellant’s hard drive. The
    Commonwealth may prove the authenticity of the password by Appellant’s own voluntary
    statements. See Pa.R.E. 901(b) (providing that the requirement of authenticating an item
    of evidence may be satisfied by testimony of a witness with knowledge that an item is
    what it is claimed to be). Here, Appellant’s voluntary statements establish that the
    password would decrypt the files on his hard drive; thus, I would conclude that the
    authenticity requirement has been satisfied.
    [J-42-2019] [MO: Todd, J.] - 11