DocketNumber: Court of Appeals Case 29A05-1710-CR-2466
Citation Numbers: 109 N.E.3d 418
Judges: Mathias
Filed Date: 8/21/2018
Status: Precedential
Modified Date: 10/19/2024
FILED Aug 21 2018, 9:51 am CLERK Indiana Supreme Court Court of Appeals and Tax Court ATTORNEYS FOR APPELLANT ATTORNEYS FOR APPELLEE William J. Webster Curtis T. Hill, Jr. Carla V. Garino Attorney General of Indiana Webster Legal, LLC Ellen H. Meilaender Westfield, Indiana Supervising Deputy Attorney General Indianapolis, Indiana IN THE COURT OF APPEALS OF INDIANA Katelin Eunjoo Seo, August 21, 2018 Appellant-Defendant, Court of Appeals Case No. 29A05-1710-CR-2466 v. Appeal from the Hamilton Superior Court State of Indiana, The Honorable Steven R. Nation, Appellee-Plaintiff. Judge Trial Court Cause No. 29D01-1708-MC-5640 Mathias, Judge. [1] Smartphones are ubiquitous in modern life. See Riley v. California, ___ U.S. ___,134 S. Ct. 2473
, 2484 (2014) (“[M]odern cell phones, . . . are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.”). The Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 1 of 68 amount of personal information contained on a typical smartphone is astounding: photographs, contacts, emails, text messages, not to mention the personal information that is contained in widely used smartphone social-media applications such as Facebook, Instagram, LinkedIn, or Twitter. United States v. Wurie,728 F.3d 1
, 7 (1st Cir. 2013) (noting that “[I]nformation [contained on a modern cell phone] is, by and large, of a highly personal nature: photographs, videos, written and audio messages (text, email, and voicemail), contacts, calendar appointments, web search and browsing history, purchases, and financial and medical records.”). Indeed, a modern smartphone is a “telephone” only as a small part of its many functions. It is more accurately described as a mobile computing and communications device with abilities that were dreams in the realm of science fiction only a few decades ago. [2] Thus, when the State seeks to search a smartphone, it seeks to inquire into far more than “old-fashioned” information physically contained on paper. In truth, nearly every smartphone contains data stored and arranged in such a way as to uniquely reveal the innermost thoughts of its owner. A smartphone is a trove of extremely personal information that is almost always embarrassing, and potentially, incriminating. A modern smartphone, with its central purpose of connecting its owner to the Internet and its ability to store and share incredible amounts of information in “the Cloud” of online storage, is truly as close as modern technology allows us to come to a device that contains all of its owner’s conscious thoughts, and many of his or her unconscious thoughts, as well. So, when the State seeks to compel a person to unlock a smartphone so that it may Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 2 of 68 search the phone without limitations, the privacy implications are enormous and, arguably, unique. Cf. United States v. Otero,563 F.3d 1127
, 1132 (10th Cir. 2009) (“The modern development of the personal computer and its ability to store and intermingle a huge array of one’s personal papers in a single place increases law enforcement’s ability to conduct a wide-ranging search into a person’s private affairs[.]”). [3] In the present case, the Hamilton Superior Court issued a search warrant ordering Katelin Eunjoo Seo (“Seo”) not only to produce her smartphone,1 but also to permit the State to search Seo’s smartphone without limitation. Seo refused to unlock the phone, citing her right against self-incrimination under the Fifth Amendment to the Constitution of the United States (“Fifth Amendment,” and “Constitution,” respectively), and the State sought to hold her in contempt for her refusal to unlock the phone. The trial court agreed with the State and held Seo in contempt for refusing to unlock her phone. Seo appeals and argues that the trial court’s order requiring her to unlock her phone violated the guarantee against self-incrimination contained in the Fifth Amendment. We agree. Accordingly, we reverse the trial court’s order finding Seo in contempt and remand for proceedings consistent with this opinion, with 1 The dissent claims that we “unnecessarily” hold that “a passcode is the equivalent of a combination to a wall safe,” because the trial court did not ask Seo to reveal her password. Slip op., infra, at 55–56. The trial court’s warrant and order, however, require Seo to unlock, and thereby decrypt, her phone. And the only way to unlock and decrypt the phone is for Seo to enter her passcode into the phone. As explained infra, we conclude that there is no meaningful difference between forcing Seo to reveal her passcode and forcing her to input her passcode into her phone and then handing it over to the police. Thus, we do not share the dissent’s belief that our holding is unnecessary. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 3 of 68 specific guidelines as to the reasonable specificity that prosecutors should show concerning the information sought in such an instance. Facts and Procedural History [4] In July 2017, Seo contacted the Hamilton County Sheriff’s Department (“HCSD”) claiming to be a victim of a rape committed by D.S. HCSD Detective Bill Inglis (“Detective Inglis”) investigated Seo’s allegations. As part of his investigation, Seo allowed Detective Inglis to view her smartphone, an Apple iPhone 7 Plus. With Seo’s consent, Inglis also did a “forensic download” of the contents of Seo’s iPhone and returned it to her. Tr. p. 6. [5] After reviewing the contents of Seo’s iPhone, Inglis decided not to pursue any charges against D.S. Instead, based on the contents of the phone and D.S.’s statements, Inglis began to investigate Seo for stalking and harassing D.S. When questioned, D.S. explained to Inglis that he received numerous calls and text messages from Seo’s phone, up to thirty per day. At some point, however, the phone number of the sender of these messages and calls began to change daily, yet the conversations were linked and apparently sent by the same person. Inglis suspected that Seo was using a third-party application to change her phone number.2 2 Detective Inglis mentioned two apps that could be used to change the caller’s cellphone number: Google Voice and “Pinger,” Tr. p. 8, the latter apparently a reference to the “Text Free Calling” app by Pinger, Inc., both of which are available for download on the Apple App Store for iPhones. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 4 of 68 [6] On July 19, 2017, the State charged Seo with Level 6 felony stalking, Class A misdemeanor intimidation, Class A misdemeanor theft, and Class B misdemeanor harassment. The information alleged that Seo had stalked and harassed D.S. with the intent to get him to either marry her or impregnate her against his will. The police arrested Seo at her place of employment that same day. At the time of her arrest, Seo had in her possession a bag that contained an iPhone and an iPad tablet. Seo admitted that the phone was hers but claimed that the iPad belonged to someone else. The iPhone appeared to be the same one she had earlier provided to the police, and the number for the iPhone matched that of the phone used to make the earlier calls and send the text messages to D.S. The police took possession of Seo’s iPhone at this time. [7] On July 21, 2017, the State charged Seo under a new cause with thirteen counts of Class A misdemeanor invasion of privacy, alleging that Seo violated a protective order preventing her from contacting D.S. On August 8, 2017, the State applied for and was granted a warrant to search Seo’s iPhone. Because Seo’s iPhone is locked, the State also sought that same day a warrant and order compelling her to unlock her iPhone so that police could search it. The trial court issued a warrant providing in relevant part: WHEREAS, William Inglis of the Hamilton County Sheriff’s Department has given sworn probable cause testimony for issuance of a Search Warrant. Based on that testimony, the Court finds probable cause exists for issuance of this Search Warrant. You are, therefore, authorized and ordered in the name of the State of Indiana, with necessary and proper assistance, in the Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 5 of 68 daytime or nighttime, to search the property located at and identified as: 5. for the purpose of searching items described in the sworn evidence, to wit: That Katelin Eunjoo Seo be compelled to unlock (via biometric fingerprint passcode, password or otherwise) the I Phone [sic] 7 plus with serial number ************ and cellular phone number ******* pursuant to Indiana Code 35- 33-5-11(a) and that if she fails to comply with this order, that she be subject to the contempt powers of the court. You are further authorized to deliver any of said items to an appropriate facility for analysis and comparison against other evidence gathered in the investigation. Appellant’s App. p. 49.3 [8] On August 15, 2017, Seo, now represented by counsel, notified the State that she would not comply with the order to unlock the phone. Accordingly, the State filed a motion that same day for a rule to show cause why Seo should not be held in contempt. The trial court held a hearing on the matter on September 21, 2017. At the conclusion of the hearing, the trial court entered an order finding Seo in contempt, which reads in relevant part as follows: 1. The State requested and the Court granted a search warrant for the contents of the phone at issue (iPhone 7 plus bearing serial number ************, previously connected with number **********) under cause number 29D01-1708-MC- 3 The probable cause affidavit supporting the issuance of this search warrant is not in the record before us. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 6 of 68 5624, and the Court took Notice of such cause for the purpose of ruling in this cause. 2. The State requested and the Court granted a search warrant compelling the Defendant to unlock the phone by biometric fingerprint access, keycode, password, passcode, or otherwise under cause number 29D01-1708-MC-5640. 3. The Court finds that the statutory requirements as found in Ind. Code 35-33-5-11 have been satisfied in this cause. 4. The act of unlocking the phone does not rise to the level of testimonial self-incrimination that is protected by the Fifth Amendment of the United States Constitution or by Article 1, Section 14 of the Indiana Constitution. 5. Katelin Eunjoo Seo is found to be in contempt of Court for failure to abide by the warrant issued under this cause: 29D0l- 1708-MC-5640. IT IS THEREFORE ORDERED, ADJUDGED AND DECREED as follows: 1. That Katelin Eunjoo Seo is ORDERED incarcerated in the Hamilton County Jail and she shall surrender herself at the Hamilton County Jail no later than 4:30 p.m. on today’s date, Friday, September 22 unless and until she purges herself of Contempt of Court. 2. That in order to purge herself of Contempt of Court, Katelin Eunjoo Seo is ORDERED to unlock the phone at issue and to (1) disable the passcode function on the phone, or (2) to change the passcode on the phone to 1234. Appellant’s App. pp. 6–7 (emphases in original). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 7 of 68 [9] The same day that the trial court entered its contempt order, Seo filed a motion to stay the contempt sanction pending appeal, which the trial court granted on September 25, 2017. Seo filed a notice of appeal on October 20, 2017.4 I. Standard of Review [10] The determination of whether a party is in contempt of court is a matter within the sound discretion of the trial court. Jones v. State,847 N.E.2d 190
, 199 (Ind. Ct. App. 2006), trans. denied. However, here, the question is whether forcing Seo to unlock her phone or reveal her password is a violation of her Fifth Amendment right against self-incrimination, and this is a pure question of law that is reviewed de novo. See United States v. Neighbors,590 F.3d 485
, 492 (7th Cir. 2009) (holding that the question of whether voice identification based on in-court proceedings for a criminal defendant violated his Fifth Amendment right against self-incrimination was a question of law reviewed de novo); Conn v. State,89 N.E.3d 1093
, 1097 (Ind. Ct. App. 2017) (noting that pure questions of law are reviewed de novo), trans. denied. II. Encryption [11] Because this case involves the technical aspects of locking and unlocking a modern smartphone, and the current caselaw considers the method of unlocking that information somewhat dispositive as to whether unlocking can 4 We held oral argument on this case on May 1, 2018. We commend counsel for the quality of their written and oral advocacy. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 8 of 68 be coerced, a brief overview of the underlying technology is in order. One law review note succinctly summarizes encryption as follows: Encryption is the process of concealing information, and all such systems have several similar characteristics. At its most basic level, encryption involves transforming information or data, called “plaintext,” into a coded form that cannot be understood by outsiders. The process is performed according to the encryption algorithm, a set of rules that governs how the plaintext is transformed. While this can be as simple as substituting each letter in a message with a corresponding number, modern encryption algorithms often consist of a complex series of mathematical functions. Regardless of the manner of encryption, the result is that the plaintext is made unintelligible to outsiders. Andrew J. Ungberg, Protecting Privacy Through a Responsible Decryption Policy, 22 Harv. J.L. & Tech. 537, 540 (2009) (citation footnotes omitted).5 Another commentator further explains: When . . . [data] is encrypted using current technology an “encryption key” is required to decrypt the message. An encryption key is basically a very long string of numbers that is stored in the encryption software’s memory. The software users do not have to remember this long number; instead [they] can enter a more easily remembered password or passphrase, which in turn activates the encryption key. When the government seeks to compel an ordinary citizen to turn over the means by which he 5 For a more detailed look at encryption and possible ways to defeat encryption, see Orin S. Kerr and Bruce Schneier, Encryption Workarounds (March 22, 2017), 106 Geo. L.J. 989 (2018). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 9 of 68 can decrypt the data, the disclosure order will typically compel him to turn over his password rather than the encryption key. Michael Wachtel, Give Me Your Password Because Congress Can Say So, 14 U. Pitt. J. Tech. L. & Pol’y 44, 48 (2013) (citations and quotations omitted). III. iPhone Security6 [12] The iPhone 7 Plus at issue here is locked, and therefore, the contents of the phone are encrypted. See Apple, iOS Security p. 14 (Jan. 2018).7 That is, even if the digital contents of the phone’s storage could be extracted from the phone, those contents would still be undecipherable without also unencrypting the contents. [13] The contents of the iPhone 7 series are encrypted with a strong 256-bit AES encryption key.8 Instead of requiring each user to memorize a 256-bit key, the key is instead itself encrypted with a “system key” unique to each phone, plus 6 The discussion that follows is focused on the smartphone at issue in this case, an iPhone 7 Plus. However, the substance of the discussion also applies to smartphones manufactured under other brand names, generally, and, in some instances, specifically. 7 https://www.apple.com/business/docs/iOS_Security_Guide.pdf 8 AES stands for “Advanced Encryption System.” Realnetworks, Inc. v. DVD Copy Control Ass’n,641 F. Supp. 2d
913, 927 (N.D. Cal. 2009). A 256-bit AES encryption key is almost unfathomably strong because there are 2256 possible keys. 2256 is approximately equivalent to 1077. By way of comparison, scientists estimate that there are 1086 (one-hundred thousand quadrillion vigintillion) atoms in the entire universe. See John Carl Villanueva, How Many Atoms Are There in the Universe? (Apr. 22, 2018), https://www.universetoday.com/36302/atoms-in-the-universe/. Thus, guessing a 256-bit key is effectively impossible. See Kerr & Schneier, supra at 994 (noting that cracking a 256-bit key is “beyond the reach of any foreseeable computer technology,” thus rendering a “brute force” repeated guessing of the key “effectively impossible.”). But the implementation of an encryption system may contain errors that allow someone to bypass this seemingly unbreakable security.Id. at 1005–06.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 10 of 68 the user-chosen passcode.Id. When a
user enters her passcode, this is combined with the system key to unlock the “File System Key,” which is used to decipher the contents of the phone.9Id. [14] Thus,
each time a user unlocks her phone, she is enabling the phone to recreate all of the information on the phone, taking what was once indistinguishable from random noise and deciphering it into the requested data. See Jeffrey Kiok, Missing the Metaphor: Compulsory Decryption and the Fifth Amendment, 24 B.U. Pub. Int. L.J. 53, 59 (2015) (discussing the process of on-the-fly encryption and decryption). 9 More precisely, a file written to the storage on the iPhone can be of one of four different “Data Protection Classes,” as assigned by the app that creates it. Apple, iOS Security p. 15. Files that are in the “Complete Protection” class are protected by a class key derived from the user passcode and the phone’s unique identifier (“UID”). “Shortly after the user locks a device . . . the decrypted class key is discarded, rendering all data in this class inaccessible until the user enters the passcode again or unlocks the device using Touch ID or Face ID.”Id. Files created
in the “Protected Unless Open” class are those that need to be written even when the device is locked, such as an email attachment downloading in the background.Id. at 16.
Such files are encrypted using a per-file asymmetric key, and the public key is stored with the encrypted per-file key.Id. When a
file in this class is closed, the per-file key is wiped from memory.Id. “To open
the file again, the shared secret is re-created using the Protected Unless Open class’s private key and the file’s ephemeral public key, which are used to unwrap the per-file key that is then used to decrypt the file.”Id. The third
class is the “Protected Until First User Authentication.”Id. “This class
behaves in the same way as Complete Protection, except that the decrypted class key isn’t removed from memory when the device is locked.”Id. Instead, the
key is removed only on reboot.Id. “The protection
in this class has similar properties to desktop full-volume encryption, and protects data from attacks that involve a reboot.”Id. This is
the default class for all third-party app data not otherwise assigned to a Data Protection class. The final class is “No Protection,” and is protected only with the UID.Id. “Since all
the keys needed to decrypt files in this class are stored on the device, the encryption only affords the benefit of fast remote wipe.”Id. However, “[i]f
a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data on an iOS device).” In the present case, there is nothing in the record to indicate which app created the information sought by the State, nor under which Data Protection class the data sought falls within. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 11 of 68 [15] Randomly guessing the passcode (a “brute force” attack) can be automated and accomplished at mind-boggling speeds by modern computers. See Paul Roberts, Update: New 25 GPU Monster Devours Passwords in Seconds, Security Ledger (Dec. 4, 2012, 19:12) (reporting on a password-guessing cluster of computer graphics cards that can guess 348 billion password hashes per second).10 But such brute force attacks are difficult because of the iPhone’s software security features, which incrementally increases the time allowed between such guesses. Apple, iOS Security p. 15. This eventually allows only one guess every hour, or, depending upon the settings of the phone, wipes the contents of the phone after ten incorrect guesses, making repeated guessing of the password impractical. [16] Thus, if the police want or need to gain access to an iPhone, the cooperation of its owner is practically a necessity. But if the owner of the smartphone is unwilling to cooperate with the police, then the police are faced with fewer options. One of these options has been to attempt to bypass the encryption via some error in the implementation of the encryption. The other has been to use the power of the courts to compel the owner to unlock the phone. This case presents the question of when the owner of the phone may refuse to cooperate with the police based upon her rights not to incriminate herself found in the U.S. Constitution. 10 https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/ Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 12 of 68 IV. The Fifth Amendment and Testimony [17] Seo claims that the trial court’s order compelling her to unlock her phone11 violates her right under the Fifth Amendment12 not to be a witness against herself. This appears to be a case of first impression in Indiana. [18] The Self-incrimination Clause of the Fifth Amendment provides that “[n]o person . . . shall be compelled in any criminal case to be a witness against himself[.]” U.S. Const. amend. V. This constitutional safeguard is applicable to state criminal cases by way of the Fourteenth Amendment. Bleeke v. Lemmon,6 N.E.3d 907
, 925 (Ind. 2014) (citing Withrow v. Williams,507 U.S. 680
, 688–89 (1993)). The Fifth Amendment prohibits compelled testimony that is incriminating.Id. (citing Hiibel
v. Sixth Judicial Dist. Ct. of Nev.,542 U.S. 177
, 190 (2004)). Thus, the government cannot force someone to provide a communication that is “testimonial” in character. In re Search Warrant 11 We take judicial notice that Seo’s iPhone 7 Plus is equipped with what Apple refers to as “Touch ID,” a biometric fingerprint sensor that can be used to unlock the phone, instead of a typed-in password. See iPhone 7 Technical Specifications, https://www.apple.com/iphone-7/specs/ (last visited August 13, 2018); Apple, iOS Security p. 7. The record is unclear as to which method of security Seo chose to use. See Tr. p. 9 (describing the phone as “locked,” but not indicating which method could be used to unlock it). However, the search warrant applied to either method. See Appellant’s App. p. 49 (order compelling Seo to unlock her phone “via biometric fingerprint, passcode, password, or otherwise[.]”). 12 Seo has yet to make any Fourth Amendment claim regarding the validity of the search warrant. Given the early procedural posture of this case, we express no opinion as to the validity of the search warrant issued by the trial court, as that issue has yet to be litigated in the first instance. We also note that Seo does not make any separate argument under the anti-self-incrimination provision of the Indiana Constitution, other than to mention the Indiana Constitution in her conclusion. We therefore focus our analysis solely on the Fifth Amendment of the Constitution of the United States. See Holloway v. State,69 N.E.3d 924
, 931 (Ind. Ct. App. 2017) (noting that a defendant cannot invoke analysis of an issue under the Indiana Constitution without a separate and independent analysis of the claim), trans. denied. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 13 of 68 Application for [redacted text],279 F. Supp. 3d 800
, 803 (N.D. Ill. 2017) (citing United States v. Hubbell,530 U.S. 27
, 34 (2000)). [19] The Fifth Amendment privilege against self-incrimination reflects our nation’s “fierce ‘unwillingness to subject those suspected of crime to the cruel trilemma of self-accusation, perjury or contempt,’ that defined the operation of . . . [Great Britain’s] Star Chamber, wherein suspects were forced to choose between revealing incriminating private thoughts or forsaking their oath by committing perjury.” Pennsylvania v. Muniz,496 U.S. 582
, 596 (1990) (quoting Doe v. United States,487 U.S. 201
, 212 (1988) (“Doe II”)). Indeed, “[t]he Fifth Amendment privilege against compulsory self-incrimination . . . protects ‘a private inner sanctum of individual feeling and thought and proscribes state intrusion to extract self-condemnation.’”Id. (quoting United
States v. Nobles,422 U.S. 225
, 233 (1975)). [20] To date, the United States Supreme Court has issued no opinion directly addressing whether compelling a person to unlock a phone or provide a passcode is testimonial.13 However, in a series of cases, the Court has explored whether certain acts of producing documents can be testimonial for Fifth Amendment purposes. Importantly, these cases span more than a century and 13 The Court has held that there is no Fifth Amendment problem with compelling a person to do something that displays a physical characteristic that might be incriminating. SeeHubbell, 530 U.S. at 35
. Among the compelled physical characteristics that have been held to be non-testimonial are fingerprints. Schmerber v. California,384 U.S. 757
, 763–65 (1966)); United States v. Hook,471 F.3d 766
, 773–74 (7th Cir. 2006). This reasoning is outdated and ironic when compared with the current, heightened, “state of the art” electronic security provided by physical characteristics such as facial recognition and retinal scans. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 14 of 68 contain important developments during times when the internet and smartphones did not exist. [21] In the late 1800s, the Court held in Boyd v. United States,116 U.S. 616
, 633 (1886), that “[w]e have been unable to perceive that the seizure of a man’s private books and papers to be used in evidence against him is substantially different from compelling him to be a witness against himself.”14 In Fisher v. United States,425 U.S. 391
(1976), however, the Court backed away from its earlier holding in Boyd, but never expressly overruled its prior holding. SeeFisher, 425 U.S. at 407
(stating that “[s]everal of Boyd’s express or implicit declarations have not stood the test of time.”). Still, in Schmerber v. California,384 U.S. 757
, 763–64 (1966), the Court cited Boyd when holding that “[i]t is clear that the protection of the [Fifth Amendment] privilege reaches an accused’s communications, whatever form they might take, and the compulsion of responses which are also communications, for example, compliance with a subpoena to produce one’s papers.” (emphasis added). [22] The Fisher Court proceeded to examine the question of what kinds of acts of production are “testimonial.” Fisher involved two consolidated cases in which the IRS served summonses on two attorneys, directing the attorneys to produce documents obtained by their clients relating to tax returns. Both attorneys argued inter alia that this would violate their clients’ rights against self- 14 See also Carpenter v. United States,138 S. Ct. 2206
, 2271 (2018) (Gorsuch, J., dissenting) (citing Richard A. Nagareda, Compulsion “To Be a Witness” and the Resurrection of Boyd, 74 N.Y.U.L. Rev. 1575, 1605–23 (1999); Rex v. Purnell, 96 Eng. Rep. 20 (K.B. 1748); Christopher Slobogin, Privacy at Risk 145 (2007)). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 15 of 68 incrimination. The Court held that the Fifth Amendment privilege could apply to situations where a defendant is compelled to produce incriminating evidence, and that the act of producing even unprivileged evidence can have communicative aspects itself and may be testimonial, entitling it to Fifth Amendment protection.Id. at 409–10.
Nevertheless, the Court noted that the Government was “in no way relying on the ‘truth-telling’ of the taxpayer to prove the existence of or his access to the documents,” and the production of the documents did not authenticate the documents, because they had been produced by accountants and not the taxpayers being investigated themselves.Id. at 411.
[23] The Court further held that, because the existence, location, and authenticity of the evidence sought was known to the government, the Fifth Amendment privilege was inapplicable because the contents of the individual’s mind was not used against him. Seeid. (“The existence
and location of the papers are a foregone conclusion and the taxpayer adds little or nothing to the sum total of the Government’s information by conceding that he in fact has the papers.”).15 Thus, the Fifth Amendment privilege did not apply to the third-party production of documents requested in Fisher.Id. at 414.
15 This is known as the “foregone conclusion” doctrine. Andrew T. Winkler, Password Protection and Self- Incrimination: Applying the Fifth Amendment Privilege in the Technological Era, 39 Rutgers Computer & Tech. L.J. 194, 197 (2013). Many cases involving encryption have been decided under the foregone conclusion doctrine, a doctrine outstripped by technology, as discussed in more detail below. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 16 of 68 [24] The Court in Doe II considered the legality of an order compelling the target of a grand jury investigation to authorize foreign banks to disclose records of hisaccounts. 487 U.S. at 202
. The target of the investigation argued that compelling him to sign the consent form would give the government access to potentially incriminating records that would otherwise be unavailable to it, due to the fact that the District Court had no power to order foreign banks to produce the documents.Id. at 204.
The Court rejected this argument and held that “an accused’s communication must itself, explicitly or implicitly, relate a factual assertion or disclose information.”Id. at 210.
[25] Justice John Paul Stevens dissented, and in its acknowledgement of his dissent, the majority famously noted: We do not disagree with the dissent that “[t]he expression of the contents of an individual’s mind” is testimonial communication for purposes of the Fifth Amendment. We simply disagree with the dissent’s conclusion that the execution of the consent directive at issue here forced petitioner to express the contents of his mind. In our view, such compulsion is more like “be[ing] forced to surrender a key to a strongbox containing incriminating documents” than it is like “be[ing] compelled to reveal the combination to [petitioner’s] wall safe.”Id. at 210
n.9 (quotingid. at 219
n.1 (Stevens. J., dissenting) (emphasis added). [26] Twelve years later, but before the advent of smartphones and a robust internet, the Supreme Court again revisited this issue in United States v. Hubbell,530 U.S. 27
(2000), a case that arose out of the Whitewater investigation. The target in that case, Webster Hubbell, had pleaded guilty to charges of mail fraud and tax Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 17 of 68 evasion arising out of his billing practices.Id. at 30.
In the plea agreement, Hubbell promised to provide the Independent Counsel with “full, complete, accurate, and truthful information” about matters relating to the Whitewater investigation.Id. [27] Later,
while Hubbell was serving his twenty-one-month prison sentence, a grand jury issued a subpoena duces tecum demanding the production of eleven categories of documents.Id. at 31.
Hubbell invoked his Fifth Amendment privilege.Id. The Independent
Counsel then produced an order from the District Court directing Hubbell to comply with the subpoena and granting him immunity against the government’s use and derivative use of the compelled testimony.Id. Hubbell then
delivered the specified documents and yet was subsequently indicted again for various wire fraud, mail fraud, and tax crimes.Id. The District
Court dismissed this new indictment based on the violation of the immunity previously granted.Id. at 32.
The United States Court of Appeals for the District of Columbia Circuit reversed and remanded, and the Supreme Court granted certiorari. [28] The Supreme Court, citing Fisher, reiterated that “a person may be required to produce specific documents even though they contain incriminating assertions of fact or belief because the creation of those documents was not ‘compelled’ within the meaning of the privilege.”Id. at 35–36.
Accordingly, the simple fact that the documents contained incriminating evidence did not mean that Hubbell could avoid complying with the subpoena.Id. at 36.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 18 of 68 [29] Importantly, however, the Court made it clear that the very act of producing documents in response to a subpoena may have a compelled testimonial aspect in and of itself.Id. “The ‘compelled
testimony’ that is relevant . . . is not to be found in the contents of the documents produced in response to the subpoena. It is, rather, the testimony inherent in the act of producing those documents.”Id. at 40
(emphasis added). [30] In discussing the government’s subpoena, which had required the defendant to provide numerous responses to very broad requests, the Court stated that “[t]he assembly of those documents was like telling an inquisitor the combination to a wall safe, not like being forced to surrender the key to a strongbox.”Id. at 43.
The Court then held that the “foregone conclusion” rationale did not apply to overcome the testimonial aspects of Hubbell’s production of documents because the government could not identify the files, describe what they were, tell whether they existed, or whether Hubbell had knowledge of, possession of, or access to them. Seeid. at 45
(“here the Government has not shown that it had any prior knowledge of either the existence or the whereabouts of the 13,120 pages of documents ultimately produced by respondent.”). Only Hubbell’s responses had provided the government with this information. Seeid. at 43
(“It was unquestionably necessary for respondent to make extensive use of ‘the contents of his own mind’ in identifying the hundreds of documents responsive to the requests in the subpoena.”). The Court concluded that the Fifth Amendment privilege did apply and that the grant of immunity extended to the Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 19 of 68 use and derivative use of the testimonial aspects of the production of those documents.Id. [31] We
acknowledge that the United States Supreme Court has backtracked from its earlier pronouncements that the protections afforded by the Fifth Amendment, in addition to the Fourth Amendment, implicated privacy concerns. Indeed, the Fisher Court noted that although it had “often stated that one of the several purposes served by the constitutional privilege against compelled testimonial self-incrimination is that of protecting personal privacy,” it then held that “[w]e cannot cut the Fifth Amendment completely loose from the moorings of its language, and make it serve as a general protector of privacy—a word not mentioned in its text and a concept directly addressed in the Fourth Amendment. We adhere to the view that the Fifth Amendment protects against compelled self-incrimination, not [the disclosure] of privateinformation.” 425 U.S. at 399
–401; see also United States v. Doe,465 U.S. 605
, 618 (1984) (“Doe I”) (O’Connor, J., concurring) (“The notion that the Fifth Amendment protects the privacy of papers originated in Boyd [], but our decision in Fisher [], sounded the death-knell for Boyd.”). [32] Still, courts continue to acknowledge that the Fifth Amendment’s anti-self- incrimination provision “protect[s] privacy in the sense of confidentiality.” See Willan v. Columbia Cty.,280 F.3d 1160
, 1163 (7th Cir. 2002). Thus, while we do not consider the Fifth Amendment as a “general protector of privacy,” we cannot ignore the privacy/confidentiality implications that compelled revelation of a smartphone passcode would inevitably have based on the Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 20 of 68 extraordinary quantitative and qualitative differences between the amount of digital information stored on a smartphone compared to traditional paper- based media. See Section VI, infra. We believe that legal analysis of digital information storage must change, and soon, in order to be relevant and credible. See Section VI and Section VIII, infra. V. The Testimonial Nature of a Passcode [33] Under current, paper-based legal analysis, Seo argues that her passcode is testimonial in nature, and that compelling her to reveal it, or compelling her to unlock the phone using the passcode, would be a testimonial act that she cannot be compelled to do without violating her Fifth Amendment privilege. Contrasting the facts of the present case with those in Doe II, Seo notes that she is being compelled to do more than merely sign a consent form to obtain records from a third party; she is instead being compelled to reveal the contents of her own mind—her password. She also argues that compelling her to reveal her password is more invasive than just requiring her to assemble documents, which was found to be testimonial in Hubbell. She is instead being compelled to give the State access to the entire contents of her mobile phone, which in all probability contains a wealth of digital information completely unrelated to the focus of law enforcement needs in her case. [34] The State contends that the Fifth Amendment is not implicated by the trial court’s order because it does not compel Seo to reveal the password to the State; it simply requires her to unlock the phone using her password (or other method) and disable the password feature so that the State may continue to access it. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 21 of 68 Accordingly, the State argues, Seo need not reveal the password, and therefore the “contents of her mind,” to the State at all. Therefore, according to the State’s argument, the foregone conclusion doctrine from Fisher controls. [35] Many courts that have considered this issue have held that forcing a person to reveal their password is testimonial because, in the words of the Doe II Court, it is “[t]he expression of the contents of an individual’smind.” 487 U.S. at 210
n.9; see also United States v. Kirschner,823 F. Supp. 2d 665
, 669 (E.D. Mich. 2010) (holding that the government could not compel the defendant to reveal his password because this amounted to “testimony” from him which would “requir[e] him to divulge through his mental processes his password.”); Kiok, supra at 76 (“Because a password comes from a defendant’s mind, its revelation is testimonial.”). [36] Indeed, when addressing Justice Stevens’s dissent in Doe, the majority of the Court noted that compelling the defendant in that case to sign the bank disclosure forms was more akin to “be[ing] forced to surrender a key to a strongbox containing incriminating documents” than it was to “be[ing] compelled to reveal the combination to [petitioner’s] wallsafe.” 487 N.E.2d at 210
n.9. Here, under precedent as it now exists, we hold that the State is seeking the electronic equivalent to a combination to a wall safe—the passcode to unlock the iPhone. [37] Moreover, some courts appear to have rejected the State’s attempt to distinguish between compelling a defendant to reveal the passcode versus Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 22 of 68 merely compelling the defendant to unlock the phone herself and give the State access to the unlocked phone. As summarized by one commentator: But what about forcing you to enter a password? Is this a compellable physical act? Three courts have answered no. In their view, forcing a person to use a password to decrypt a hard drive is not a physical act because it forces the person to use the contents of his mind. Also prevalent in these courts’ reasoning is the key-combination dicta already discussed: “A password, like a combination, is in the suspect’s mind, and is therefore testimonial . . . .” Dan Terzian, The Micro-Hornbook on The Fifth Amendment and Encryption, 104 Geo. L. J. Online 168, 171–72 (2016). [38] The three cases Terzian refers to are: In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011,670 F.3d 1335
, 1346 (11th Cir. 2012), which held that “the decryption and production of the hard drives would require the use of the contents of Doe’s mind and could not be fairly characterized as a physical act that would be nontestimonial in nature.”; In re Boucher,2007 WL 4246473
, at *3 (D. Vt. Nov. 29, 2007),16 which held that entering a password into a computer implicitly communicates facts and was therefore testimonial in nature; and Commonwealth v. Baust, 89 Va. Cir. 267 (2014), which held that compelling defendant to provide access to his locked phone through his 16 The initial decision in Boucher was issued by the District Court Magistrate, whose decision was overturned by the District Court Judge in the subsequent decision. But the subsequent decision was based on the “foregone conclusion” doctrine. See In re Boucher,2009 WL 424718
at *3 (D. Vt. Feb. 19, 2009) (citingFisher, 425 U.S. at 411
). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 23 of 68 passcode was testimonial. See also Kiok, supra at 76 (“an order to compel decryption [i.e., unlocking a smartphone] compels a testimonial act.”); Andrew T. Winkler, Password Protection and Self-Incrimination: Applying the Fifth Amendment Privilege in The Technological Era, 39 Rutgers Computer & Tech. L.J. 194, 209 (2013) (“Entering a password or otherwise decrypting the contents on a computer is a testimonial act that receives the full protection of the Fifth Amendment.”).17 [39] Upon consideration of this authority, and because we believe that electronic data and the devices that contain it are fundamentally different than paper documents and paper storage, we reject the State’s attempt to distinguish between compelling Seo to convey her passcode to the State and compelling Seo to simply unlock her phone by entering the passcode itself. It is a distinction 17 Interestingly, some courts have made a distinction between compelling a person to unlock a phone using a password and compelling a person to unlock a phone using a fingerprint. As noted above, the Supreme Court has held that forcing someone to submit to the taking of fingerprints is not testimonial.Schmerber, 384 U.S. at 764
; see alsoHook, 471 F.3d at 773
–74. Because of this, at least two courts have held that there is no Fifth Amendment problem with compelling a defendant to produce a fingerprint to unlock a smartphone. Baust, 89 Va. Cir. 267, at *4; State v. Diamond,905 N.W.2d 870
, 878 (Minn. 2018). Asnoted, supra
, it is the height of irony that the most secure current forms of electronic identification, the fingerprint, and more recently, facial recognition or retinal scans, currently have no protection against compulsory use by law enforcement authorities under Schmerber et al. This difference is reflective of legal thinking from a paper-based world that courts currently are called upon to stretch to fit a world of electronic data about everything and everyone. Our courts need a new paradigm that reflects our modern world. However, even the fingerprint-unlocking function of the iPhone 7 at issue here will become inoperative after forty-eight hours, thereby requiring the use of a passcode. See Terzian, 104 Geo. L. J. Online at 169 (citing Apple, About Touch ID Advanced Security Technology (Sept. 11, 2017) (noting that a fingerprint alone is insufficient to unlock an iPhone when “more than 48 hours have elapsed from the last time” the phone was unlocked). Here, it has been well more than forty-eight hours since Seo’s phone has been unlocked by the fingerprint sensor. Thus, even though the State might be able to compel Seo to attempt to use her fingerprint to unlock the phone, this would, in all likelihood, be unsuccessful. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 24 of 68 without a difference because the end result is the same: the State is compelling Seo to divulge the contents of her mind to obtain incriminating evidence. [40] Furthermore, we consider Seo’s act of unlocking, and therefore decrypting the contents of her phone, to be testimonial not simply because the passcode is akin to the combination to a wall safe as discussed in Doe. We also consider it testimonial because her act of unlocking, and thereby decrypting, her phone effectively recreates the files sought by the State. As discussed above, when the contents of a phone, or any other storage device, are encrypted, the cyphertext is unintelligible, indistinguishable from random noise. In a very real sense, the files do not exist on the phone in any meaningful way until the passcode is entered and the files sought are decrypted. Thus, compelling Seo to unlock her phone goes far beyond the mere production of paper documents at issue in Fisher, Doe, or Hubbell. Because compelling Seo to unlock her phone compels her to literally recreate the information the State is seeking, we consider this re- creation of digital information to be more testimonial in nature than the mere production of paper documents. [41] Stripping legal precedent away from the issue, the very nature of a passcode supports the conclusion that it is the product of one’s mind. Many people choose a passcode that is uniquely memorable to them in some way. Often, the password is an important date or other bit of information they hope will not be easily guessed, but that is still uniquely memorable to them. To force Seo to reveal her passcode is the very definition of compelling her to reveal the Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 25 of 68 contents of her mind. Accordingly, we hold that compelling Seo to unlock her phone in any manner is testimonial.18 VI. The “Foregone Conclusion” Doctrine [42] The State and the dissent argue that compelling Seo to unlock her phone is not a violation of the Fifth Amendment privilege because of the “foregone conclusion” doctrine. “Even if a response is testimonial, the privilege does not apply where the testimonial portion is a foregone conclusion.” Dan Terzian, Forced Decryption as a Foregone Conclusion,6 Cal. L
. Rev. Cir. 27, 28 (May 2015). Under the “foregone conclusion” doctrine: the Fifth Amendment does not protect an act of production when any potentially testimonial component of the act of production— such as the existence, custody, and authenticity of evidence—is a “foregone conclusion” that “adds little or nothing to the sum total of the Government’s information.” [Fisher, 425 U.S. at 411
]. For the rule to apply, the Government must be able to “describe with reasonable particularity” the documents or evidence it seeks to compel.[Hubbell, 530 U.S. at 30
]. United States v. Apple MacPro Computer,851 F.3d 238
, 247 (3d Cir. 2017); see also Kerr & Schneier, supra at 1002 (“The foregone conclusion doctrine teaches that, 18 For the Fifth Amendment privilege to apply, the testimony at issue must also be incriminating.Bleeke, 6 N.E.3d at 925
(citingHiibel, 542 U.S. at 190
). Here, neither party disputes that the information the State seeks from Seo’s iPhone would be incriminating. Moreover, given the vast amounts of personal information located on a typical smartphone, there should be a reasonable presumption that something incriminating would be discovered during review of the contents of almost anyone’s smartphone. Consider the expansive law enforcement claims that could be made under the plain view doctrine or the good faith exception to the Fourth Amendment or Article 1 Section 11 of the Constitution of Indiana protections when searching a smartphone. See note 26, infra. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 26 of 68 if the testimonial aspect of production is already known to the government and is not to be proven by the testimonial act, then the testimony is a foregone conclusion and the Fifth Amendment privilege does not apply.”).19 [43] “Although the State need not have ‘perfect knowledge’ of the requested evidence,” for the foregone conclusion rationale to apply, “it ‘must know, and not merely infer,’ that the evidence exists, is under the control of defendant, and is authentic.” State v. Stahl,206 So. 3d 124
, 135–36 (Fla. Dist. Ct. App. 2016) (citing United States v. Greenfield,831 F.3d 106
, 116 (2d Cir. 2016)) (emphasis removed). Thus, where the foregone conclusion rationale applies, the question is not of testimony, but of surrender.Id. at 136
(citingFisher, 425 U.S. at 411
). [44] In this sense, the foregone conclusion doctrine of Fifth Amendment jurisprudence contains its own requirement of specificity regarding the information sought from the defendant, i.e., that the State or government be able to describe with reasonable particularity the documents or evidence it seeks to compel. Very importantly, this particularity requirement prevents the foregone conclusion exception from swallowing the rule by requiring that the State already know the documents or evidence it seeks. So long as the State already knows with reasonable particularity the documents or evidence it seeks, the surrender of the evidence “adds little or nothing to the sum total of the 19 There appears to be some confusion as to whether the foregone conclusion rationale is a true exception to the Fifth Amendment privilege as it applies to testimonial production of documents, or whether the foregone conclusion rationale means that the production of the documents at issue is simply not testimonial. Either way, however, if the foregone conclusion doctrine is applicable, under current precedent, there is no Fifth Amendment protection. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 27 of 68 Government’s information.”Fisher, 425 U.S. at 411
. In contrast, where the State does not already know the evidence exists, it cannot describe with reasonable particularity the evidence it seeks, and the foregone conclusion exception will not apply. [45] The State argues that the foregone conclusion should apply under the facts of the present case. The State focuses its argument not on the contents of the phone, but on the passcode itself. Specifically, the State claims, “the act of unlocking a cell phone contains only one implied fact: the person knows the password to the phone, which by inference says that the person has control over and possession of the phone.” Appellee’s Br. at 19. The State therefore contends that the foregone conclusion rationale should apply because “a person must know her passcode to use her own phone, the testimony implicit in the act of unlocking the phone is a foregone conclusion when the State has proven that the phone belongs to her.”Id. at 22
(emphasis added). [46] There is some support for the State’s position. Indeed, it is one of the two paths of legal analysis using a paper-based analogy. For example, in State v. Stahl, the court held that, in deciding whether providing a passcode to a locked phone fell within the ambit of the foregone conclusion doctrine, “the relevant question is whether the State has established that it knows with reasonable particularity that the passcode exists, is within the accused’s possession or control, and isauthentic.” 206 So. 3d at 136
(emphasis added); see United States v. Spencer, ___ F.Supp.3d ___,2018 WL 1964588
at *3 (N.D. Cal. April 26, 2018) (holding that, to determine whether the foregone conclusion doctrine applied, the Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 28 of 68 appropriate question was whether the government could show that it was a foregone conclusion that the defendant could decrypt the devices); Commonwealth v. Davis,176 A.3d 869
, 876 (Pa. Super. Ct. 2017) (holding that the foregone conclusion doctrine applied where the state was able to show that it knew that the passcode existed, it was within the defendant’s possession or control, and was authentic); Commonwealth v. Gelfgatt,11 N.E.3d 605
, 615 (Mass. 2014) (concluding that the “factual statements that would be conveyed by the defendant’s act of entering an encryption key in[to] the computers [were] ‘foregone conclusions[.]’”); United States v. Fricosu,841 F. Supp. 2d 1232
, 1236– 37 (D. Colo. 2012) (holding that the foregone conclusion doctrine applied where the State had evidence proving the encrypted computer belonged to the defendant and that she knew the password). [47] However, Seo argues the other path of the paper-based legal analogy: the foregone conclusion doctrine does not apply here because the State cannot describe with reasonable particularity the digital files or evidence it seeks to compel her to produce. That is, Seo argues that the focus of the foregone conclusion analysis is not whether it is a foregone conclusion that Seo knows her own passcode; rather, the focus should be on whether the State can describe with reasonable particularity the digital information it seeks to compel her to produce. See Apple MacProComputer, 851 F.3d at 247
(citingHubbell, 530 U.S. at 30
). And there is support for Seo’s framing and application of the foregone conclusion doctrine in other jurisdictions that have considered her argument. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 29 of 68 [48] In Commonwealth v. Baust, the court held that the password itself was not a foregone conclusion because it was not known outside of the defendant’s mind. 89 Va. Cir. 267 at *4. Presaging Seo’s argument here, the Baust court held that, “[u]nlike a document or tangible thing, such as an unencrypted copy of the footage itself, if the password was a foregone conclusion, the Commonwealth would not need to compel Defendant to produce it because they would already know it.” Id.; see also In re Grand Jury Subpoena Duces Tecum Dated March 25,2011, 670 F.3d at 1347
(holding that the foregone conclusion doctrine was inapplicable where the government had not shown that it possessed knowledge as to the “files on the [encrypted] hard drives at the time it attempted to compel production.”); Sec. & Exch. Comm’n v. Huang,2015 WL 5611644
, at *4 (E.D. Pa. Sept. 23, 2015) (holding that the foregone conclusion doctrine did not apply because the SEC had no evidence any digital files it sought were actually located on the target’s work-issued smartphones). [49] With an eye toward a more comprehensive rethinking of the legal analysis regarding digital information and storage, we believe these cases express the better rationale.20 What is being compelled here is not merely the passcode. As described above, compelling Seo to enter her password forces her to effectively re-create the entire contents of her phone. In the words of the Third Circuit 20 This is one of the two available rationales under the outdated paper paradigm that our courts are stumbling through in an effort to resolve information production disputes regarding electronic data on electronic devices. Judge May in her dissent chooses the opposite alternative. We believe the alternative branch of cases we have chosen contains the better rationale because it not only resolves the instant issue and case; it also presages a suggested way forward in this important and continually evolving area. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 30 of 68 Court of Appeals, the State must be able to describe with reasonable particularity the digital files it seeks to compel. Apple MacProComputer, 851 F.3d at 247
(citingHubbell, 530 U.S. at 30
). Here, what the State seeks to compel is not merely the password, but the entire contents of Seo’s iPhone. Thus, for the foregone conclusion doctrine to apply, the State must be able to describe with reasonable particularity the discrete contents on Seo’s phone—e.g., all texts to D.S. created on Seo’s iPhone—that it is compelling her to not only produce, but to re-create by entering her passcode and decrypting the contents of the phone. This is a burden the State has not met. [50] To be sure, the investigating detective has already viewed Seo’s phone and has seen information that caused him to believe that D.S. was the victim of stalking and harassment by Seo. Indeed, Detective Inglis testified that he made a “forensic download” of the contents of Seo’s phone. Tr. p. 6. We may therefore presume that the State already has much of the information contained on Seo’s phone.21 But it is not this information the State now seeks to compel. Instead, what the State seeks now is evidence that might have been created on Seo’s 21 We also note that the information the State seeks is not of an emergency nature, or of a completely new description or character from that information it already has. The State could potentially prove its case entirely from the text messages received by D.S. and that may still be found on his cellphone, comparing the alleged threats and harassment language after the protective order was issued to the threatening and harassing texts contained in its forensic download of Seo’s cellphone with her consent. The State has also not shown that it has tried unsuccessfully to obtain the desired information through readily available and far less constitutionally intrusive methods, such as third-party subpoenas to Seo’s cell carrier regarding the texts at issue or to Apple to inquire as to what applications she has downloaded, with an eye toward those apps or services that could mask her cellphone number. A subpoena to Google could also reveal any Google Voice numbers Seo has secured, and the State could compare those numbers to the sources of the texts to D.S. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 31 of 68 phone after this forensic download, i.e., evidence that Seo sent the flood of threatening and harassing messages to D.S. But again, the State has not described with any particularity the digital information it seeks to access. [51] We acknowledge that the State secured a search warrant for the contents of Seo's iPhone. However, this warrant did not describe with any reasonable particularity the digital information the State sought to find, as the Fifth Amendment requires.22 Instead, the warrant merely stated that the police were: authorized and ordered in the name of the State of Indiana, with necessary and proper assistance, in the daytime or nighttime, to search the property located at and described as: 5. for purpose of searching items described in the sworn evidence, to wit: That Katelin Eunjoo Seo be compelled to unlock (via biometric fingerprint, passcode, password, or otherwise) the I Phone [sic] 7 plus with serial number ************ and cellular phone number ******* pursuant to Indiana Code 35- 33-5-11(a) and that if she fails to comply with this order, that she shall be subject to the contempt powers of the court. 22 We decline to address whether the issuance of a search warrant is sufficient to meet the State’s burden under the foregone conclusion doctrine to describe with reasonable particularity the digital files or evidence it seeks to compel. The Fourth Amendment requirement for probable cause requires only that the magistrate issuing the warrant make a “practical, common-sense decision whether, given all the circumstances set forth in the affidavit, there is a fair probability that contraband or evidence of a crime will be found in a particular place.” State v. Spillers,847 N.E.2d 949
, 952–53 (Ind. 2006). This appears to us to be a lower standard than that required for the foregone conclusion doctrine to apply, i.e., that the government be able to describe with “reasonable particularity” the documents or evidence it seeks to compel.Hubbell, 530 U.S. at 44
–45. Moreover, here, there has yet to be a challenge to the propriety of the warrant. Indeed, such a challenge would likely come only after the State has searched the phone, discovered incriminating evidence, if any, and attempts to use that evidence at trial. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 32 of 68 Appellant’s App. p. 49. [52] Thus, the warrant itself does not describe with any particularity the digital information the State seeks to compel Seo to produce or the evidence the State is authorized to search for.23 Nor does the trial court’s order on contempt describe with any reasonable particularity the digital information the State seeks to compel.24 [53] Going forward the State can, and should, describe the information it seeks and the programs that contain it on Seo’s cellphone, e.g., any texts between Seo and D.S., whether in Apple’s Message application, Facebook, Twitter or otherwise, and the contents of any application that allows a user to change the apparent telephone number originating an electronic communication, such as Google Voice or Pinger. And perhaps more importantly, in its order the court should also require the State to limit its search within messaging to variations of D.S’s 23 This observation is not a comment on the propriety of the search warrant for purposes of the Fourth Amendment or Article 1, Section 11 of the Indiana Constitution. We merely hold that for purposes of applying the foregone conclusion doctrine under the Fifth Amendment, the State has not described with reasonable particularity the digital files or data it seeks to compel. 24 The dissent contends that, based on Detective Inglis’s testimony at the hearing on the State’s motion to hold Seo in contempt, “it seems self-evident the State is seeking evidence on Seo’s phone of an App or multiple Apps that would allow her to mask her identity and evidence that Seo’s phone had generated the phone calls and texts that D.S. received from phone numbers that did not belong to any other person.” Slip op. at 65 n.8. But by the time Detective Inglis testified, the State had already obtained a warrant compelling Seo to unlock her phone. And there is nothing in the language of the warrant itself that describes with any particularity the information the State was authorized to look for. Although the dissent faults Seo for failing to present us with a more complete record, it is the language of the warrant itself, not the probable cause affidavit or testimony supporting the warrant, that is the controlling legal document which compels Seo to unlock her phone. And even after Detective Inglis’s testimony, the order holding Seo in contempt again does not describe with any particularity the information the State seeks to compel. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 33 of 68 name, rather than allowing the State to view everything that is contained in the messaging applications involved. These are not onerous requirements. [54] Accordingly, we conclude that the State has not met the requirements of the foregone conclusion doctrine because it has not demonstrated that it can, with reasonable particularity, identify any files or describe where they are. SeeHubbell, 530 U.S. at 45
; In re Grand Jury Subpoena Duces Tecum Dated March 25,2011, 670 F.3d at 1347
; Sec. & Exch. Comm’n,2015 WL 5611644
at *4. Instead, here, all the State has demonstrated is that evidence relating to the harassment and intimidation charges is probably on the phone. But it has failed to describe with adequate reasonable particularity the files or evidence it seeks on Seo’s smartphone. [55] It bears repeating that writs of assistance were the immediate evils that motivated the framing and adoption of the Fourth Amendment. Payton v. New York,445 U.S. 573
, 583 (1980). Although this case does not directly involve the Fourth Amendment, in criminal cases raising the Fifth Amendment, the law requires the State to describe the information it seeks to compel production of with reasonable particularity. [56] Even in civil cases, modern, electronic discovery standards require that the requesting party specifically tailor its request to discover relevant information. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 34 of 68 See Zubulake v. UBS Warburg LLC,217 F.R.D. 309
, 322 (S.D.N.Y. 2003).25 And in civil cases, opponents are also required to detail and attempt to obtain the information sought from third-party sources before seeking to compel the opponent to produce the information directly. The same should be true in criminal cases as well. Only then is an assault on Fifth Amendment privilege against self-incrimination a reasonable option under the law. [57] As noted above, the Fifth Amendment privilege against self-incrimination reflects our nation’s fundamental principles. These principles should not be altered by the advance of technology. To the contrary, they must be applied consistently and with recognition of the technology that has replaced physical papers, files, boxes and safes. Cf. Carpenter v. United States,138 S. Ct. 2206
, 2222 (2018) (“When confronting new concerns wrought by digital technology, this Court has been careful not to uncritically extend existing precedents.”); Collins v. Virginia,138 S. Ct. 1663
, 1671 (2018) (declining to expand the automobile exception to the warrant requirement to include a search of a vehicle parked in the curtilage of a home because to do so would “undervalue the core Fourth Amendment protection afforded to the home and its curtilage and ‘untether’ the automobile exception ‘from the justifications underlying’ it.”) (quoting Riley v. California, 573 U.S. ___,134 S. Ct. 2473
, 2485 (2014)). Indeed, these principles 25 In civil cases involving requests for discovery of electronic information, courts have applied a multi-factor test that includes consideration of the extent to which the request is specifically tailored to discover relevant information and the availability of such information from other sources.Zubulake, 217 F.R.D. at 322
. Certainly, such concerns are all the more pressing in criminal cases where the State seeks production of digital information that may incriminate the defendant or others. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 35 of 68 are all the more important given the amount and potentially incriminating nature of information contained in a smartphone. VII. Outdated Analogies [58] Advances in technology have rendered paper-based analogies more and more inapt, if not wholly inadequate. See Kiok, supra at 76 (“Many analogies to older technology simply do not replicate how electronic encryption actually works. Although metaphors are useful in analogizing new technology to older, more familiar one[s], if the metaphor is stretched too far, it loses its usefulness to courts and commentators.”). Thus, to compare a smartphone and its contents to a paper file located in a locked file cabinet or wall safe, as the current case law does, is at the very least, a gross oversimplification. The information stored on a smartphone is qualitatively and quantitatively unique. [59] As indicated in our introduction, the sheer quantity of personal information contained on a typical smartphone is truly astounding. In the years that the paper-based analogies were first made, it would have taken thousands, if not millions, of sheets of paper and photographs to equal the amount of digital information, such as email, text messages, photographs, and videos, stored in a modern smartphone. [60] As recently as 2000, “only” 80 billion consumer photos were taken annually. Since the advent of the smartphone, this number has grown at an astonishing rate: by 2010, the number of photos taken annually had nearly tripled to over 200 billion, with projections that 1.3 trillion photos would be taken by 2017, and Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 36 of 68 over 79% of these photos were taken with some kind of phone. See Stephen Heyman, Photos, Photos Everywhere, N.Y. Times, July 29, 2015.26 These predictions were pretty accurate, as it was reported that 1.2 trillion photos were taken in 2017, 85% taken with smartphones. See Caroline Cakebread, People will take 1.2 trillion digital photos this year — thanks to smartphones, Business Insider, Aug. 31, 2017.27 A 2015 study revealed that the average smartphone user takes 150 photos per month and has 630 photos stored on the phone. See Janko Roettgers, Special report: How we really use our camera phones, GigaOm (Jan. 23, 2015, 5:00 a.m. CDT).28 These numbers can only have grown since then with the increased storage capacity of more recent smartphones. [61] Text messaging presents a similar story. A 2011 study by the Pew Research Center showed that users sent or received an average of 41.5 messages per day. See Aaron Smith, How Americans Use Text Messaging, Pew Research Center (Sept. 19, 2011).29 This number has certainly only grown. Indeed, one report indicated that between 2011 and 2014, global text message usage grew by 140%. Kenneth Burke, How Many Texts Do People Send Every Day?, Text Request (May 18, 2016).30 This same report indicates that globally 18.7 billion text 26 Available at https://www.nytimes.com/2015/07/23/arts/international/photos-photos-everywhere.html 27 http://www.businessinsider.com/12-trillion-photos-to-be-taken-in-2017-thanks-to-smartphones-chart- 2017-8 28 https://gigaom.com/2015/01/23/personal-photos-videos-user-generated-content-statistics/ 29 Available at http://www.pewinternet.org/2011/09/19/how-americans-use-text-messaging/ 30 https://www.textrequest.com/blog/how-many-texts-people-send-per-day/ Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 37 of 68 messages were sent every day.Id. And these
statistics do not include two of the most widely used app-to-app messaging platforms, WhatsApp and Facebook Messenger, which then combined for 60 billion messages per day.Id. Apple’s Messages
app sent over 40 billion notifications per day in 2016 and peaked at 200,000 messages per second. See Kif Leswing, Apple says people send as many as 200,000 iMessages per second, Business Insider, Feb. 13, 2016 (citing an interview of Apple Services Vice President Eddy Cue).31 [62] The point of these statistics is not to overwhelm the reader with numbers, but simply to illustrate how different a smartphone is from traditional paper-based media. To compare a smartphone to a locked strongbox or a wall safe, as the currently existing case law does, stretches these analogies beyond the breaking point. Perhaps a more apt analogy would be to compare a smartphone to a literal warehouse containing thousands of personal photographs, millions of lines of text contained in emails, messages, personal conversations, medical information, and other items of the most intimate nature. Some commentators have even compared a smartphone to a “second brain” or “an extension of the mind.” See Yo Zushi, Life with a smartphone is like having a second brain in your 31 http://www.businessinsider.com/eddy-cue-200k-imessages-per-second-2016-2 (citing The Talk Show, Daring Fireball (Feb. 12, 2016), https://daringfireball.net/thetalkshow/2016/02/12/ep-146 Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 38 of 68 pocket, New Statesman (Feb. 22, 2017);32 Karina Vold, Is Your Smartphone an Extension of Your Mind?, Motherboard (Mar. 2, 2018, 10:00 a.m.).33 [63] The paper-based analogies are also less and less apt as technology advances. In the days of the floppy disk, it was understandable to compare a digital file stored on such a disk to a physical piece of paper stored in a filing cabinet. Indeed, the basis of the most computer user interfaces retains the “desktop metaphor” of files, folders, and trash cans and recycling bins. But the advent of readily available, reliable, fast, and easy-to-use encryption has changed this metaphor. As noted above, encryption takes existing information and obscures it in such a manner that it is unreadable and unrecoverable unless it is decrypted with the proper key. To use the wall-safe metaphor, with encryption, when one locks the safe with the combination, the letter inside is shredded into millions of tiny pieces that no person could ever hope to reassemble; yet when one reenters the combination and unlocks the safe, the pieces of the letter almost magically reassemble themselves to reconstitute the letter. [64] Despite the weaknesses of the current paper-based metaphors, the controlling Fifth Amendment case law still uses these metaphors. And we are not at liberty to create our own analogies or frameworks when it comes to the federal Constitution. This is a task reserved for the High Court itself. Thus, as we have explained, we believe that compelling an individual to unlock her smartphone 32 https://www.newstatesman.com/science-tech/2017/02/life-smartphone-having-second-brain-your-pocket 33 https://motherboard.vice.com/en_us/article/qvemgb/is-your-smartphone-an-extension-of-your-mind Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 39 of 68 by passcode is a testimonial act more akin to unlocking a wall safe than handing over the key to a locked strongbox. VIII: A Way Forward? [65] Electronic data storage of any type has stretched paper-based rules, rubrics, and rationales beyond their breaking points. As the Fisher court observed about the ruling in Boyd ninety years earlier, today, many paper-based rules, rubrics and rationales have not stood the test of time, especially as time is accelerated by developments in technology.34 Simply said, electronic data and its storage are, by their nature, intrinsically different than records stored on paper, and the law must recognize that difference in order to honor our shared belief in a free society, limited only as reasonably required for public safety.35 Going forward, we ask reviewing courts of last resort to consider the following structure for resolving decryption requests from law enforcement authorities: 34 In 1965, American computer engineer Gordon Moore predicted that the number of transistors in a silicon chip would double every year. He later revised this prediction to a doubling of transistors every two years, but in reality, the pace has been a doubling every eighteen months. See Moore’s Law, Encyclopædia Britannica (Nov. 29, 2017), available at https://www.britannica.com/technology/Moores-law. However, the laws of both physics and economics have recently brought the continuing validity of Moore’s prediction into question. See Tom Simonite, Moore’s Law is Dead. Now What?, MIT Technology Review (May 13, 2016), https://www.technologyreview.com/s/601441/moores-law-is-dead-now-what/; End of Moore’s Law: It’s Not Just About Physics, Scientific American (last visited Aug. 13, 2018), https://www.scientificamerican.com/article/end-of-moores-law-its-not-just-about-physics/. 35 We must keep in mind that the Federalist Framers were forced to include a Bill of Rights, including the Fourth and Fifth Amendments, by their opponents, the Anti-Federalists, in the state ratification conventions. See United States v. Emerson,270 F.3d 203
, 237 (5th Cir. 2001) (noting that the Anti-Federalists wanted the United States Constitution, like most of the state Constitutions, to contain a Bill of Rights to prevent the federal government from infringing upon the fundamental rights of the people). Without the clear recognition of these personal rights, the United States, as we know it, would never have existed. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 40 of 68 1. Requiring a defendant to decrypt digital data should be legally recognized for what it is—coerced recreation of incriminating evidence— and compulsory process for that purpose should be strictly limited for precisely that reason. 2. In some instances, law enforcement officials will have legitimate need of digital information that is protected by encryption. 3. If the law enforcement request is a bona fide emergency, with verified concern about the possibility of further and immediate serious criminal acts, a warrant that describes the other imminent crime(s) suspected and the relevant information sought through a warrant, both with reasonable particularity, will likely satisfy Fourth and Fifth Amendment requirements. 4. In non-emergency situations, law enforcement should be required to first seek the digital data it wants from third parties, such as internet “cloud” sources, cellphone companies, or internet providers (ISPs), where a defendant has practically, if not explicitly, consented to production upon legal process from a court of competent jurisdiction.36 5. Exceptions to the Fourth Amendment and its state analogues, such as the plain view doctrine and the good faith exception, should be 36 Defendants in criminal cases are entitled to at least the same rights in this regard as are parties in civil cases. SeeZubulake, 217 F.R.D. at 322
. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 41 of 68 inapplicable to, or strictly limited in, the search and seizure of digital data stored on devices owned or controlled by that defendant, or from “Cloud” subscriptions that defendant owns or uses. 37 Conclusion [66] Courts will continue to be faced with issues involving the intersection of the law and rapidly-emerging technology. Technology moves faster than the law. See, e.g., People v. Kramer,706 N.E.2d 731
, 734 (N.Y. 1998). But the principles embodied in the Bill of Rights by our Founding Fathers are timeless. Seeid. (“[Technology] cannot
be allowed to outpace the array of checks and balances and protections affecting [] privacy intrusions, important to individuals and society at large[.]”). [67] In this case, we apply these founding principles to modern technology and conclude that compelling Seo to unlock her iPhone, under the threat of contempt and imprisonment, is constitutionally prohibited by the Fifth Amendment because revealing or using the passcode to do so is a testimonial 37 See Orin S. Kerr, Digital Evidence and the New Criminal Procedure, 105 Colum. L. Rev. 279, 314 (Jan. 2005) (suggesting that the plain view doctrine be abolished in computer searches because “computers often must be searched comprehensively to locate the evidence sought,” and “the plain view rule threatens to collapse the distinction between particular and general warrants. A particular warrant in theory may become a general warrant in practice, as all of the evidence in the computer may come into plain view during the course of the forensic analysis.”); Orin S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 576 (Apr. 2005) (“[A] tightening of the plain view doctrine may be necessary to ensure that computer warrants that are narrow in theory do not become broad in practice.”); see also Orin S. Kerr, Executing Warrants for Digital Evidence: The Case for Use Restrictions on Nonresponsive Data, 48 Tex. Tech L. Rev. 1, 21 (2015) (revisiting the author’s earlier conclusions and suggesting that “[t]he plain view doctrine might not be the problem, and eliminating the plain view exception might not be the answer,” and arguing that the use of non-responsive data found during a search instead renders the seizure unreasonable). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 42 of 68 act. In addition, to date, the State has not met the requirements of the foregone conclusion doctrine: to describe with reasonable particularity the information it seeks to compel Seo to produce and why. In this non-emergency situation, the State should also first seek the evidence it feels it needs to prosecute the crime(s) alleged from third-party sources. We therefore reverse the order of the trial court finding Seo in contempt and remand for proceedings consistent with this opinion.38 [68] Reversed and remanded. Riley, J., concurs in result. May, J., dissents with opinion. 38 As noted above, our opinion today does not foreclose the possibility of the State continuing the prosecution of Seo. See note21, supra
. Furthermore, the State may have other means of discovering the contents of Seo’s phone. Although the contents of the phone itself are encrypted, some of the information might still be in the possession of third parties, such as the manufacturer of the phone (Apple, as to cellphone- number-spoofing apps downloaded by Seo) or her service provider (such as AT&T, Verizon, T-Mobile, Sprint, etc., as to when text messages were sent). And at least one manufacturer sells a turn-key solution that claims to be able to exploit an as-yet unrevealed vulnerability in the iPhone’s passcode lockout feature to circumvent the lockout and enable police to brute-force the password. See Thomas Fox-Brewster, Mysterious $15,000 ‘GrayKey’ Promises To Unlock iPhone X For The Feds, Forbes (March 5, 2018, 12:10 p.m.), https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/. However, a recently released update to the iPhone software apparently thwarts this exploit. See Chris Welch, Apple releases iOS 11.4.1 and blocks passcode cracking tools used by police, The Verge (July 9, 2018, 2:17 p.m.), https://www.theverge.com/2018/7/9/17549538/apple-ios-11-4-1-blocks-police-passcode-cracking-tools. This is all the more reason for courts to consider both smartphone users’ privacy rights and the reasonable needs of law enforcement in a comprehensive way as soon as possible. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 43 of 68 ATTORNEYS FOR APPELLANT ATTORNEYS FOR APPELLEE William J. Webster Curtis T. Hill, Jr. Carla V. Garino Attorney General of Indiana Webster Legal, LLC Ellen H. Meilaender Westfield, Indiana Supervising Deputy Attorney General Indianapolis, Indiana IN THE COURT OF APPEALS OF INDIANA Katelin Eunjoo Seo, Court of Appeals Case No. 29A05-1710-CR-2466 Appellant-Defendant, v. State of Indiana, Appellee-Plaintiff. May, Judge, dissenting. [69] When Seo wanted to have charges brought against D.S., she unlocked her cell phone and gave it to police so they could download its contents. Only by viewing those contents and then talking to D.S. did police learn that charges might instead be brought against Seo. Thus, the police already have proof that the cell phone in question belongs to Seo and that Seo can open it. Given that Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 44 of 68 those facts are a foregone conclusion, Seo’s act of producing her unencrypted cell phone does not provide an inference of any “incriminating testimony” and, therefore, under the specific facts before us, I would hold Seo’s Fifth Amendment right against self-incrimination is not being violated by the order that she unlock the phone. See, e.g., United States v. Spencer,2018 WL 1964588
(N.D. Cal. 2018) (Fifth Amendment not violated by order for Spencer to decrypt the device where the State demonstrated, by clear and convincing evidence, that Spencer’s ability to decrypt the device is a foregone conclusion). Accordingly, I respectfully dissent. [70] To explain why I reach that conclusion and where my understanding of Fifth Amendment jurisprudence diverges from the majority’s opinion, I need to address numerous parts of the majority’s analysis. Privacy and the Fifth Amendment [71] As the majority notes, modern Fifth Amendment jurisprudence begins with Boyd v. United States,116 U.S. 616
(1886). Slip op. at 15 (discussing Boyd). See also Wayne R. LaFave, Jerold H. Israel, Nancy J. King, & Orin S. Kerr, Criminal Procedure: The Boyd “principle”, in 3 CRIM. PROC. § 8.12(a) (4th ed., Dec. 2017 Update) (hereinafter “LaFave et al., Boyd principle”) (“the Boyd analysis remains a universally accepted starting point for understanding the many strands of current Fifth Amendment doctrine applicable to the subpoena duces tecum”). Boyd held “the seizure of a man’s private books and papers to be used in evidence against him is [not] substantially different from compelling Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 45 of 68 him to be a witness against himself.”Boyd, 116 U.S. at 633
. As LaFave and his colleagues explain: Boyd relied on what has been described as a “property oriented” view of the Fourth and Fifth Amendments, built upon the owner’s right of privacy in the control of his lawfully held possessions. It recognized a special Fifth Amendment interest in the privacy of documents, viewing the forced production of their contents as equivalent to requiring a subpoenaed party to reveal that content through his testimony. . . . [T]he key to the Court’s analysis appeared to be invasion through forced production of the individual’s privacy interest in his possession of property in which the public had no entitlement. LaFave et al., Boyd principle. [72] Since that time, however, the Supreme Court has “gradually developed a series of doctrines that chipped away at the broad implications of Boyd’s property- rights/privacy analysis of Fifth Amendment protection,”id., such that
“very little if anything, remains of Boyd’s Fifth Amendment analysis.”Id. See also
Carpenter v. United States,2018 WL 3073916
at *66 (2018) (Gorsuch, J., dissenting) (“To be sure, we must be wary of returning to the doctrine of Boyd . . . [which] invoked the Fourth Amendment to restrict the use of subpoenas even for ordinary business records and, as Justice Alito notes, eventually proved unworkable.”). In fact, in 1976, the Supreme Court explicitly rejected the idea that the Fifth Amendment was intended to protect private information: The proposition that the Fifth Amendment protects private information obtained without compelling self-incriminating testimony is contrary to the clear statements of this Court that Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 46 of 68 under appropriate safeguards private incriminating statements of an accused may be overheard and used in evidence, if they are not compelled at the time they were uttered; and that disclosure of private information may be compelled if immunity removes the risk of incrimination. If the Fifth Amendment protected generally against the obtaining of private information from a man’s mouth or pen or house, its protections would presumably not be lifted by probable cause and a warrant or by immunity. The privacy invasion is not mitigated by immunity; and the Fifth Amendment’s strictures, unlike the Fourth’s, are not removed by showing reasonableness. The Framers addressed the subject of personal privacy directly in the Fourth Amendment. They struck a balance so that when the State’s reason to believe incriminating evidence will be found becomes sufficiently great, the invasion of privacy becomes justified and a warrant to search and seize will issue. They did not seek in still another Amendment the Fifth to achieve a general protection of privacy but to deal with the more specific issue of compelled self-incrimination. We cannot cut the Fifth Amendment completely loose from the moorings of its language, and make it serve as a general protector of privacy a word not mentioned in its text and a concept directly addressed in the Fourth Amendment. We adhere to the view that the Fifth Amendment protects against “compelled self- incrimination, not (the disclosure of) private information.” Fisher v. United States,425 U.S. 391
, 400-01 (1976). See also Dan Terzian, The Fifth Amendment, Encryption, and the Forgotten State Interest, 61 UCLA L. Rev. Discourse 298, 307 (2014) (“Privacy is no longer a Fifth Amendment value.”). [73] Because the United States Supreme Court has explicitly rejected the notion that the Fifth Amendment is intended to protect any privacy interest in information, I find irrelevant my colleagues’ repeated references to the “trove of . . . almost Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 47 of 68 always embarrassing, and potentially, incriminating” information they keep on their cell phones. Slip op. at 2-3; see alsoid. at 1-2
(“The amount of personal information contained on a typical smartphone is astounding[.]”);id. at 26
n.20 (“[G]iven the vast amounts of personal information located on a typical smartphone, there should be a reasonable presumption that something incriminating would be discovered during review of the contents of almost anyone’s smartphone.”) (emphasis in original); 39 andid. at 36-38
(discussing the amount of data processed by and kept on phones). Encryption and Its Implications [74] Part of the reasoning behind the majority’s holding that forcing Seo to unlock her phone implicates the Fifth Amendment is because her act of unlocking, and thereby decrypting, her phone effectively recreates the files sought by the State. . . . In a very real sense, the files do not exist on the phone in any meaningful way until the passcode is entered and the files sought are decrypted. 39 In the same footnote, my colleagues express concern about “the expansive law enforcement claims that could be made under the plain view doctrine or the good faith exception to the Fourth Amendment or Article 1 Section 11 of the Constitution of Indiana protections when searching a smartphone.” Slip op. at 26 n.20. While I am not unconcerned about the implications of plain view and good faith when the police are given unfettered access to the contents of a citizen’s smartphone, I also recognize that the application of the Fourth Amendment is not before us in this appeal and that our decision under the Fifth Amendment ought not be conflated with Fourth Amendment concerns. See Carpenter,2018 WL 3073916
at *13 (“Our decision today is a narrow one. We do not express a view on matters not before us.”); and seeFisher, 425 U.S. at 401
(“the Fifth Amendment protects against ‘compelled self-incrimination, not (the disclosure of) private information’”). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 48 of 68 Slip op. at 25. I concede that encryption turns readable digital data into digital random noise. I cannot, however, agree that decryption constitutes “creation of testimony” that should implicate the Fifth Amendment. [75] Seo is not being forced, under the penalties of perjury or torture, to download new Apps or to write and send new text messages. The evidence being sought from Seo’s phone – text messages matching those received by D.S. from phone numbers that were not assigned to any identifiable person and identity masking applications – already are among the files on Seo’s phone, otherwise they could not have been encrypted when Seo locked her phone.40 As such, decryption does not use the contents of Seo’s mind to create new information. Instead, pre- existing information is simply being rendered intelligible. [76] Therefore, in my opinion, the law ought to treat files on a cell phone – encrypted or not – like prior-produced documents sitting in a file cabinet, which do not enjoy Fifth Amendment protection. See United States v. Hubbell,530 U.S. 27
, 35-36 (2000) (“a person may be required to produce specific documents even though they contain incriminating assertions of fact or belief because the creation of those documents was not ‘compelled’ within the meaning of the privilege”);id. at 36
(“Hubbell could not avoid compliance with the subpoena served on him merely because the demanded documents contained incriminating evidence, whether written by others or voluntarily prepared by 40 The question of whether the State has probable cause to believe it will find that expected evidence of the alleged crimes on Seo’s phone is a Fourth Amendment question that, once again, is not before us in this appeal.See supra
n. 39. Accordingly, for my analysis, I assume arguendo the evidence exists on her phone. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 49 of 68 himself.”);Fisher, 425 U.S. at 409-410
(“the preparation of all of the papers sought in these cases was wholly voluntary, and they cannot be said to contain compelled testimonial evidence, either of the taxpayers or of anyone else”). See also In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011,670 F.3d 1335
, 1342 (11th Cir. 2012) (“the files, if there are any at all in the hidden portions of the hard drives, are not themselves testimonial”). [77] To hold otherwise as to data on encrypted devices creates an ever-increasingly unpoliceable “zone of lawlessness” that could not have been envisioned when the Fifth Amendment was adopted. See Dan Terzian, The Micro-Hornbook on the Fifth Amendment and Encryption, 104 Geo. L.J. Online 168 (2016) (“The DOJ calls encryption a “zone of lawlessness.”); see also Slip op. at 12 (advanced security features on modern cellphones render nearly impossible brute force attacks on passcodes, such that “if the police want or need to gain access to an iPhone, the cooperation of its owner is practically a necessity”). The Fifth Amendment, like other portions of the Bill of Rights, was intended to balance the government’s interest in policing to maintain the common welfare of the people with each individual citizen’s interest in liberty from government intrusion. See California v. Byers,402 U.S. 424
, 427 (1971) (Fifth Amendment questions “must be resolved in terms of balancing the public need on the one hand, and the individual claim to constitutional protections on the other; neither interest can be treated lightly.”); see also Terzian, 61 UCLA L. Rev. Discourse at 307 (“Forming the Fifth Amendment’s core value, then, is its aim to achieve a fair state-individual balance. Where there is a real societal need to Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 50 of 68 limit the privilege, the Court has repeatedly permitted compulsion upon the defendant.”). I do not believe the creation of a zone-of-lawlessness outside a person’s mind from which individual citizens could commit crimes against others without government recourse can be a proper balancing of those interests. See generallyid. Accordingly, I
believe we must find a path forward that balances the governmental and individual interests without creating a zone of lawlessness from which one citizen may harass another without government intervention. See, e.g., Kastigar v. United States,406 U.S. 441
, 445-46 (1972) (statutes granting immunity for compelled testimony “seek a rational accommodation between the imperatives of the privilege and the legitimate demands of government to compel citizens to testify”), reh’g denied. Keys, Combinations, and the “Contents of One’s Mind” [78] As the majority discusses, in 1988, the United States Supreme Court decided a citizen’s Fifth Amendment privilege against self-incrimination was not violated by an order that compelled him to sign a consent form authorizing foreign banks to release any records of accounts in his name to the United States government. Doe v. United States,487 U.S. 201
, 219 (1988) (hereinafter “Doe 2”). Justice Stevens dissented from that decision, arguing that a citizen “may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe—by word or by deed.”Id. at 219
(Stevens, J., dissenting). In response, the Court’s majority noted: Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 51 of 68 We do not disagree with the dissent that “[t]he expression of the contents of an individual’s mind” is testimonial communication for purposes of the Fifth Amendment. We simply disagree with the dissent’s conclusion that the execution of the consent directive at issue here forced petitioner to express the contents of his mind. In our view, such compulsion is more like “be[ing] forced to surrender a key to a strongbox containing incriminating documents” than it is like “be[ing] compelled to reveal the combination to [petitioner’s] wall safe.”Id. at 210
n.9. [79] A majority of the Supreme Court again referenced this key-combination dichotomy when it decided Hubbell: It was unquestionably necessary for respondent to make extensive use of “the contents of his own mind” in identifying the hundreds of documents responsive to the requests in the subpoena. The assembly of those documents was like telling an inquisitor the combination to a wall safe, not like being forced to surrender the key to a strongbox.Hubbell, 530 U.S. at 43
(Hubbell’s Fifth Amendment privilege was violated by a subpoena that forced him to comb through thousands of documents to find those that fit the government’s request.). [80] Based on that language from Doe 2 and Hubbell, courts being asked to determine whether a citizen could be forced to reveal the passcode for locked electronic devices have frequently turned to this key-combination dichotomy and asked whether the electronic passcode is more like a key or a combination. Some courts have held that a passcode is more like a combination because both are Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 52 of 68 kept in a person’s mind, such that the production of the password would be testimonial and is prohibited by the Fifth Amendment.41 See, e.g., United States v. Kirschner,823 F. Supp. 2d 665
, 668-9 (E.D. Mich. 2010) (government cannot compel disclosure of password because it requires defendant “to divulge through his mental processes his password”); In re Boucher, No. 2:06-mj-91,2007 WL 4246473
, at *4 (D. Vt. Nov. 28, 2007) (“A password, like a combination, is in the suspect’s mind, and is therefore testimonial and beyond the reach of the grand jury subpoena.”) (hereinafter “Boucher 1”, rev’d, No. 2:06- mj-91,2009 WL 424718
(D. Vt. Feb 19, 2009) (enforcing subpoena seeking decrypted data, but not the password itself) (hereinafter “Boucher 2”). [81] However, at least one commentator on Fifth Amendment jurisprudence argues courts ought to reconsider whether to apply this key-combination dichotomy to electronic passcodes: Passwords should not be forced into this key-combination dichotomy. They are neither a key nor a combination, and Court doctrine suggests the dichotomy should not be mechanically applied to new unlocking mechanisms. This dichotomy developed because keys and combinations have different Fifth Amendment implications—only combinations present the danger of compelling the creation of evidence. So it follows that new unlocking mechanisms with new implications should also be treated differently. Passwords for encrypted data present new 41 If, however, the passcode were written down on a piece of paper and placed in a drawer, then production of that passcode undoubtedly could be compelled because in those circumstances the passcode is indistinguishable from a key. Terzian, 104 Geo. L.J. Online at 169 n.8 (noting “if the password is physically recorded somewhere, the government can subpoena the production of that password” but “the subpoena won’t yield anything if (when) the defendant responds that there is no written password”). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 53 of 68 implications in interest balancing and therefore should be treated differently. First, consider the interest balancing with safe combinations. There, a fair state-individual balance favors the individual—and compelled production is prohibited—because there is little state need; law enforcement can easily crack a safe through its own efforts. Contrast that with passwords. Law enforcement usually cannot bypass them, leaving the data inaccessible and creating great need for the password or decrypted data’s production. Terzian, 61 UCLA L. Rev. Discourse at 301-2. [82] Others have challenged the logic of applying this key-combination dichotomy because the government’s ability to open an electronic device should not be determined by “whether [someone] protected that drive using a fingerprint key or a password composed of symbols.” Spencer,2018 WL 1964588
at *2. See also State v. Stahl,206 So. 3d 124
, 135 (Fla. Ct. App. 2016) (“we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones with letter and number combinations than to individuals who use their fingerprint as the passcode”). As the majority notes, there is little doubt that the government could compel a citizen to display a physical characteristic, even if that characteristic might be incriminating, because it is not testimonial. Slip op. at 14 n.14.42 Thus, arguably, courts could compel citizens to open an electronic device that is 42 The majority then asserts this reasoning is “outdated and ironic when compared with” modern electronic scanning mechanisms. Slip op. at 14 n.14. The majority does not explain how or why advanced scanning equipment should lead courts to overturn the long-standing rule that physical characteristics are not testimony, and I thus cannot agree with the majority that this rule is “outdated and ironic.”Id. Court of
Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 54 of 68 unlocked by fingerprint, retinal scan, or face scan, because production of those physical characteristics is not “testimony” prohibited by the Fifth Amendment. See Schmerber v. California,384 U.S. 757
, 764 (1966) (physical evidence can be compelled and Fifth Amendment does not protect against the compulsion to provide fingerprints);Hubbell, 530 U.S. at 34-5
(“[E]ven though the act may provide incriminating evidence, a criminal suspect may be compelled to put on a shirt, to provide a blood sample or handwriting exemplar, or to make a recording of his voice.”) (footnotes omitted); United States v. Hook,471 F.3d 766
, 773-74 (7th Cir. 2006) (“[T]he taking of blood samples or fingerprints is not testimonial evidence and as such is not protected by the Fifth Amendment.”), cert. denied.549 U.S. 1343
. [83] The majority herein decides: “under the precedent as it now exists, we hold that the State is seeking the electronic equivalent to a combination to a wall safe— the passcode to unlock the iPhone.” Slip op. at 22. I do not believe the precedent compels the result the majority reaches, because while a passcode is similar to a combination, an electronic device arguably is materially distinguishable from a wall safe. Nor do I believe the majority ought to be deciding an issue that is not before us today, as Seo has not been asked to reveal her password. See Carpenter,2018 WL 3073916
at *13 (“Our decision today is a narrow one. We do not express a view on matters not before us. . . . As Justice Frankfurter noted when considering new innovations in airplanes and radios, the Court must tread carefully in such cases, to ensure that we do not ‘embarrass the future.’”). I accordingly dissent from the majority’s Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 55 of 68 unnecessarily holding a passcode is the equivalent of a combination to a wall safe. [84] The trial court instead ordered Seo to produce the decrypted device. The Eleventh Circuit considered whether forced decryption was testimonial and determined it too was compelled testimony prohibited by the Fifth Amendment because “the decryption and production of the hard drives would require the use of the contents of Doe’s mind and could not be fairly characterized as a physical act that would be nontestimonial in nature.” In re Grand Jury Subpoena Duces Tecum Dated March 25,2011, 670 F.3d at 1346
. [85] This Eleventh Circuit holding has been challenged on two grounds: First, it misreads Supreme Court dicta. The dicta regards only compelling production: The government can compel the production of keys but not the production of combinations. It’s silent on whether the government can compel unlocking (i.e., forcing a person to enter a combination without producing a copy). This silence, coupled with the dicta’s rationale, suggests that compelling unlocking may be constitutional. The reason for the Court distinguishing between key- and combination- productions stems from the Court’s concern over compelled creation. Combinations may not exist outside a person’s mind, so producing them would require compelling the creation of a physical version, and it is this compelled creation that makes the response testimonial. There are no such compelled creation concerns with compelled unlocking through forced decryption— the data is already there, the person just needs to unlock it; and unlocking it does not require creating a physical copy of the password. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 56 of 68 The second stumble comes in the Eleventh Circuit’s analysis of mental effort. Entering an oft-used password requires no more mental effort than finding a key. You remember the key’s location and then find it, just as you remember the password and then input it. Dan Terzian, Forced Decryption as Equilibrium—Why It’s Constitutional and How Riley Matters, 109 Nw. U. L. Rev. Online 56, 59-60 (2014).43 [86] The majority herein explicitly rejects the State’s attempt to distinguish production of the passcode from production of the unlocked device “because the end result is the same: the State is compelling Seo to divulge the contents of her mind.” Slip op. at 25. By so holding, the majority has fallen into the first “stumble” noted above – Seo is not being required to “divulge” anything from her mind. Just the opposite, she is unlocking the device without revealing the contents of her mind, and to the extent she is required to use her mind to do so, the mental effort is no greater than the mental effort required to locate and 43 Elsewhere, Terzian objected to the Eleventh Circuit’s decision thus: [The Eleventh Circuit] addressed the question of whether the Fifth Amendment bars the compelled decryption and production of the now-unencrypted data. It held affirmatively and explicitly framed the issue within this dichotomy, finding compelled decryption “most certainly more akin to requiring the production of a combination.” This reasoning ignores a pivotal prefatory question: Do passwords even belong in this dichotomy? A computer password is not a safe combination. Sure, they are similar, but that does not mean they must be treated the same. Combinations and keys are similar— both unlock safes—yet they are treated differently because only the former implicated compelled creation concerns. It follows, then, that courts should treat passwords and combinations differently if they have meaningfully different Fifth Amendment implications. And they do. Passwords and encrypted data implicate fair balancing concerns that support permitting compelled production, while combinations do not. Terzian, 61 UCLA L. Rev. Discourse at 306. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 57 of 68 produce a key to a file cabinet. For these reasons, I would hold the only self- incrimination ground for challenging the compelled production of an unlocked and decrypted electronic device “lies in the testimonial aspects of the act-of- production,” just as it does with the production of preexisting papers. Wayne R. LaFave, Jerold H. Israel, Nancy J. King, & Orin S. Scott, The Schmerber rule, 3 CRIM. PROC. § 8.12(d) n.48 (4th ed. Dec. 2017 Update) (hereinafter “LaFave et al., Schmerber rule”). And it is to this issue that I turn next. Act of Production, Foregone Conclusion, & Reasonable Specificity [87] The act of producing a decrypted device might itself be protected by the Fifth Amendment. SeeHubbell, 530 U.S. at 37
(“Whether the constitutional privilege protects . . . the act of production itself . . . is a question that is distinct from the question whether the unprotected contents of the documents themselves are incriminating.”). To explain why I do not believe Seo’s production of her decrypted iPhone implicates Fifth Amendment concerns, I begin with a discussion of the relevant case law. [88] Our country’s Highest Court explained: The act of producing evidence in response to a subpoena nevertheless has communicative aspects of its own, wholly aside from the contents of the papers produced. Compliance with the subpoena tacitly concedes the existence of the papers demanded and their possession or control by the taxpayer. It would also indicate the taxpayer’s belief that the papers are those described in the subpoena. The elements of compulsion are clearly present, but the more difficult issues are whether the tacit averments of the taxpayer are both “testimonial” and “incriminating” for Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 58 of 68 purposes of applying the Fifth Amendment. These questions perhaps do not lend themselves to categorical answers; their resolution may instead depend on the facts and circumstances of particular cases or classes thereof.Fisher, 425 U.S. at 410
(internal citation omitted). [89] In Fisher, the government subpoenaed tax preparation documents that had been produced by an accountant and were in the accountant’s files. The Court noted the Fifth Amendment did not apply to the documents themselves “because the documents were created voluntarily and the Government had not compelled their creation.” Jeffrey Kiok, Missing the Metaphor: Compulsory Decryption and the Fifth Amendment, 24 B.U. Pub. Int. L.J. 53, 61 (Winter 2015) (citingFisher, 425 U.S. at 410
n.11). The Fisher Court determined “the act of producing [the papers] would not itself involve testimonialself-incrimination.” 425 U.S. at 411
. The papers belong to the accountant, were prepared by him, and are the kind usually prepared by an accountant working on the tax returns of his client. Surely the Government is in no way relying on the “truth-telling” of the taxpayer to prove the existence of or his access to the documents. The existence and location of the papers are a foregone conclusion and the taxpayer adds little or nothing to the sum total of the Government’s information by conceding that he in fact has the papers. Under these circumstances by enforcement of the summons “no constitutional rights are touched. The question is not of testimony but of surrender.”Id. (internal citations
omitted). Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 59 of 68 [90] That holding by the Fisher Court created what has become known as the foregone conclusion standard, which has been described thus: Where the existence and possession of the documents to be produced are a “foregone conclusion,” the act of production similarly “adds little or nothing to the sum total of the government’s information” and therefore is no more testimonial than other compelled physical acts. The government in such a case obviously is not seeking the assertions of the subpoenaed party as to the facts of existence and possession, and his incidental communication as to those facts, inherent in the physical act that the government had the authority to compel, therefore does not rise to the level of compelled “testimony.” Wayne R. LaFave, Jerold H. Israel, Nancy J. King, & Orin S. Kerr, Testimonial character and the foregone conclusion standard, 3 CRIM. PROC. § 8.13(a) (4th ed. Dec. 2017 Update) (hereinafter “LaFave et al., Foregone Conclusion”). [91] In United States v. Doe,465 U.S. 605
, 613 (1984) (hereinafter, “Doe 1”), the Supreme Court was again asked to decide whether the act of producing documents would violate a citizen’s Fifth Amendment right. The District Court had found “enforcement of the subpoenas would compel [respondent] to admit that the records exist, that they are in his possession, and that they are authentic.”Id. at 613
n.11. The Supreme Court noted it could “not over turn that finding unless it has no support in the record.”Id. at 614.
Based thereon, the Supreme Court held Doe’s act of producing the subpoenaed documents to be protected by the Fifth Amendment privilege against self-incrimination.Id. at 614.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 60 of 68 Subsequent to Doe [1], lower court rulings generally insisted that the foregone conclusion standard be met by the government “demonstrat[ing] with reasonable particularity that it knows of the existence and location of subpoenaed documents.” Those rulings recognized, however, that there are a variety of ways in which such a demonstration may be made. These include: some prior action by the subpoenaed party acknowledging that the particular documents existed and were in his possession; identification of some person (as in the case of the accountants in Fisher) who can testify that the particular documents were previously in the possession of the subpoenaed party; documents or similar evidence in the government’s possession which would indicate that the subpoenaed documents exist and are in the subpoenaed person’s possession; and the fact that the documents are of a type regularly sent to the subpoenaed person by another doing business with that person, combined with absence of any dispute as to whether he received such documents. Similarly, as to authentication, courts held that the foregone conclusion standard is met where the government can point to another person (e.g., the preparer of the document) who can authenticate, or where authentication can be achieved by other means (e.g., comparison with other documents independently authenticated or matching the handwriting with that of the subpoenaed party). As with existence and possession, the government must point to a specific avenue of authentication “by means independent of the producer’s act of production. To merely state that [the government] will not utilize the act of production would amount to no more than an informal offer of immunity, which Doe [1] rejected as an inappropriate grounding for enforcing the subpoena. LaFave et al., Foregone Conclusion (footnotes omitted). [92] Then, in Hubbell, the Supreme Court was asked to decide “whether the Fifth Amendment privilege protects a witness from being compelled to disclose the Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 61 of 68 existence of incriminating documents that the Government is unable to describe with reasonable particularity[.]”Hubbell, 530 U.S. at 29-30
(footnote omitted). There, the governments subpoenaed eleven categories of documents from a grand jury witness, Hubbell. Hubbell invoked his Fifth Amendment privilege and refused to admit whether he had such documents. The prosecutor then promised Hubbell immunity, and Hubbell produced 13,120 pages of documents and testified those were all the documents in his control that were requested by the subpoena.44Id. at 31.
Based on the information in those documents, the government brought a second set of charges against Hubbell for crimes the government had not been investigating when Hubbell responded to the subpoena. Instead, the government had discovered those crimes by studying the contents of the documents Hubbell produced.Id. at 32.
[93] The Supreme Court noted: [W]hen the custodian of documents responds to a subpoena, he may be compelled to take the witness stand and answer questions designed to determine whether he has produced everything demanded by the subpoena. The answers to those questions, as well as the act of production itself, may certainly communicate information about the existence, custody, and authenticity of the documents. 44 All, that is, except those protected by attorney-client privilege or work-product privilege.Hubbell, 530 U.S. at 31
. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 62 of 68Id. at 37.
The Court then held Hubbell’s act of production had a testimonial aspect because the government had not demonstrated the testimony produced was a foregone conclusion: Whatever the scope of this “foregone conclusion” rationale, the facts of this case plainly fall outside of it. While in Fisher the Government already knew that the documents were in the attorneys’ possession and could independently confirm their existence and authenticity through the accountants who created them, here the Government has not shown that it had any prior knowledge of either the existence or the whereabouts of the 13,120 pages of documents ultimately produced by respondent.Id. at 44-45.
[94] Because Hubbell did not clarify the scope of the foregone conclusion standard, lower courts have continued to struggle with determining whether an act of production is both testimonial and incriminating based “on the facts and circumstances of particular cases.”Fisher, 425 U.S. at 410
. Courts have especially had difficulty when applying this standard to compulsory decryption of an electronic device, “often reconsidering and overturning their own prior orders when faced with changing facts, or facts that were not well-understood in the first place.” Kiok, 24 B.U. Pub. Int. L.J. at 65. [95] The majority’s review of the parties’ arguments provides citation to many of these cases, with parentheticals describing the various holdings, so I need not repeat all of them here. See Slip op. at 29-31. Instead, I provide this summary: Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 63 of 68 A defendant’s ability to invoke the Fifth Amendment in the context of a compulsory order to decrypt will depend on the foregone conclusion doctrine and events that in all likelihood long preceded the subpoena or warrant. The foregone conclusion doctrine will permit the Government to compel a defendant when the Government can otherwise prove that the hard drive and its data was the sole property of the defendant. If a defendant confesses to possession of the drive, that may suffice. If the Government can view some portion of the hard drive and determine that the files belonged to one individual, that too may suffice. Kiok, 24 B.U. Pub. Int. L.J at 77-78 (footnotes omitted). [96] Herein, the majority holds that what the State seeks to compel is not merely the password, but the entire contents of Seo’s iPhone. Thus, for the foregone conclusion rationale to apply, the State must be able to describe with reasonable particularity the discrete contents on Seo’s phone—e.g., all texts to D.S. created on Seo’s iPhone—that it is compelling her to not only produce, but to re-create by entering her passcode and decrypting the contents of the phone. This is a burden the State has not met. Slip op. at 31 (emphasis in original). [97] However, in so holding, the majority has followed authority that, I believe, misapplies the foregone conclusion doctrine to electronic devices. 45 The State 45 In addition, the majority’s holding relies on a premise that I do not accept – that the contents of a decrypted electronic device are the equivalent of testimony created by compulsion.See supra
Encryption and Its Implications. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 64 of 68 has not presented Seo with a subpoena requiring her to produce each text message she sent to D.S., such that Seo must, like Hubbell, use her mind to discern which text messages fit within the categories of messages requested and then testify that she produced all relevant requested evidence. SeeHubbell, 530 U.S. at 45
(“the Government has not shown that it had any prior knowledge of either the existence or the whereabouts of the 13,120 pages of documents ultimately produced by respondent”). Nor has Seo been ordered to sort through thousands of electronic devices in her possession to produce those devices that contain the requested evidence. [98] Instead, the State has asked Seo to unlock a file cabinet so that the State may search within that file cabinet for evidence of specific crimes the State is already investigating. The State’s right to access such a file cabinet will undoubtedly require a Fourth Amendment showing of probable cause to believe the particular evidence sought will exist within that cabinet. See U.S. Const. amend. IV (“no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized”). But the validity under the Fourth Amendment of the order for Seo to open her phone is not before us, and the Fifth Amendment does not require the State to demonstrate in advance “the discrete contents” of the evidence that will be found in a cabinet,46 see United 46 Even if I could agree with my colleagues that the reasonable particularity standard required the State to make a showing, with reasonable particularity, of the evidence it expects to find within the electronic device being sought, I would be hesitant to hold, based on the record before us, that the State had not met that Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 65 of 68 States v. Fricosu,841 F. Supp. 2d 1232
, 1237 (D. Col. 2012) (“[T]he government knows of the existence and location of the computer’s files. The fact that it does not know the specific content of any specific documents is not a barrier to production[.]”), because the Fifth Amendment does not protect the content of the documents. SeeFisher, 425 U.S. at 409
(“the Fifth Amendment would not be violated by the fact alone that the papers on their face might incriminate the taxpayer, for the privilege protects a person only against being incriminated by his own compelled testimonial communications”). standard herein. At the hearing on the State’s motion for rule to show cause, Detective Inglis testified that Seo initially used her own phone number to contact D.S.; however, [t]hen the contact to [D.S.] started coming from more random phone numbers that when I would try and research the phone number to find out who it belonged to, or who it was assigned to, there was no record of it being assigned to anybody and the numbers would change. He would get a dozen or 30 phone calls or texts from one number and then the next day it would be a different number but it would obviously be conversations that were linked with the same. (Tr. at 7.) D.S. was contacted by “dozens of phone numbers.” (Id.) Detective Inglis said “it appeared that she was using an ap [sic] or an internet program such as Google Voice or Pinger to disguise her phone number so that it wouldn’t show up in his caller ID.” (Id. at 8.) The State asked Detective Inglis if he had subpoenaed the Apps or Internet services that could mask identity, and he testified: There are numerous, and there’s probably some that I’m not even aware of, numerous entities out there like Google Voice and Pinger and Text Now and Text Me, and I don’t know, I don’t have an all-encompassing list of them, however if I had the phone I could see which ones she had accessed. (Tr. at 12.) Thus, it seems self-evident the State is seeking evidence on Seo’s phone of an App or multiple Apps that would allow her to mask her identity and evidence that Seo’s phone had generated the phone calls and texts that D.S. received from phone numbers that did not belong to any other person. Also troubling for me is the majority’s insistence “the State has not described with reasonable particularity the digital files or data it seeks to compel,” (Slip op. at 33 n.25; and seeid. at 32),
when the Record provided to us on Appeal does not contain any of the documentation or testimony provided to the trial court before the search warrant was issued. I acknowledge “the warrant itself does not describe with any particularity the digital information the State seeks to compel,” (id. at 33), but I would not infer from the absence of such description in the warrant that the evidence is likewise absent from portions of the Record that Seo has not provided to us. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 66 of 68 [99] Because of this material distinction between the order in Hubbell and this order to open an iPhone, the only testimony being implied by Seo’s act of decrypting the phone is that the phone is hers and she has the ability to unlock it. 47 These are facts the State can already prove by “clear and convincing evidence,” Spencer,2018 WL 1964588
at *3 (“The appropriate standard is instead clear and convincing evidence. This places a high burden on the government to demonstrate that the defendant’s ability to decrypt the device at issue is a foregone conclusion.”), because Seo has already unlocked the phone for police when she gave it to them to download, the investigating officer had called Seo at the phone number associated with the phone in question, and Seo admitted the phone was hers when she was arrested. As such, Seo’s act of production does “not itself involve testimonial self-incrimination.”Fisher, 425 U.S. at 411
; see Spencer,2018 WL 1964588
(foregone conclusion applies where defendant admitted buying and encrypting external hard drive matching one found in his house);Friscosu, 841 F. Supp. 2d at 1236-37
(foregone conclusion applies where State knows computer belongs to defendant and knows she has password). In Summary [100] The Fifth Amendment is intended to prohibit the government from compelling incriminating testimony, not to protect the privacy of personal information. The Fifth Amendment could not have been intended to create a zone-of- 47 Moreover, it is unnecessary to “ask whether the government has established with ‘reasonable particularity’ that the defendant is able to decrypt a device. . . . [A] defendant’s ability to decrypt is not subject to the same sliding scale. He is either able to do so, or he is not.” Spencer,2018 WL 1964588
at *3. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 67 of 68 lawlessness outside a person’s mind that the government would be unable to police to maintain the safety of all citizens. While decrypting an electronic device requires the use of the contents of the owner’s mind, the task requires such little mental effort that I would hold the only Fifth Amendment barrier to production of the decrypted device is if the act of production itself implies incriminating testimony. The act of production cannot, however, produce incriminating testimony when the facts confirmed by that decryption – that the citizen owns the device and has the ability to decrypt it – are a foregone conclusion because the government already has clear and convincing evidence of those facts. [101] As Seo unlocked her phone for police on another occasion, as police had contacted Seo on that phone, and as Seo admitted the phone was hers when she was arrested, I would hold Seo’s possession and ability to decrypt the phone are foregone conclusions. Seo therefore can be compelled to decrypt her phone without infringing the Fifth Amendment. [102] For all these reasons, I respectfully dissent. Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 68 of 68
United States v. Nobles , 95 S. Ct. 2160 ( 1975 )
Payton v. New York , 100 S. Ct. 1371 ( 1980 )
In Re Grand Jury Subpoena Duces Tecum , 670 F.3d 1335 ( 2012 )
Boyd v. United States , 6 S. Ct. 524 ( 1886 )
Kastigar v. United States , 92 S. Ct. 1653 ( 1972 )
Pennsylvania v. Muniz , 110 S. Ct. 2638 ( 1990 )
United States v. Otero , 563 F.3d 1127 ( 2009 )
State v. Spillers , 2006 Ind. LEXIS 420 ( 2006 )
United States v. Neighbors , 590 F.3d 485 ( 2009 )
United States v. George C. Hook , 471 F.3d 766 ( 2006 )
Jones v. State , 2006 Ind. App. LEXIS 817 ( 2006 )
Schmerber v. California , 86 S. Ct. 1826 ( 1966 )
Doe v. United States , 108 S. Ct. 2341 ( 1988 )
Riley v. Cal. United States , 134 S. Ct. 2473 ( 2014 )
Thomas Willan v. Columbia County , 280 F.3d 1160 ( 2002 )