Filed: Dec. 07, 2016
Latest Update: Mar. 03, 2020
Summary: NOT FINAL UNTIL TIME EXPIRES TO FILE REHEARING MOTION AND, IF FILED, DETERMINED IN THE DISTRICT COURT OF APPEAL OF FLORIDA SECOND DISTRICT STATE OF FLORIDA, ) ) Petitioner, ) ) v. ) Case No. 2D14-4283 ) AARON STAHL, ) ) Respondent. ) ) Opinion filed December 7, 2016. Petition for Writ of Certiorari to the Circuit Court for Sarasota County; Frederick P. Mercurio, Judge. Pamela Jo Bondi, Attorney General, Tallahassee, and Bilal A. Faruqui, Assistant Attorney General, Tampa, for Petitioner. Howard
Summary: NOT FINAL UNTIL TIME EXPIRES TO FILE REHEARING MOTION AND, IF FILED, DETERMINED IN THE DISTRICT COURT OF APPEAL OF FLORIDA SECOND DISTRICT STATE OF FLORIDA, ) ) Petitioner, ) ) v. ) Case No. 2D14-4283 ) AARON STAHL, ) ) Respondent. ) ) Opinion filed December 7, 2016. Petition for Writ of Certiorari to the Circuit Court for Sarasota County; Frederick P. Mercurio, Judge. Pamela Jo Bondi, Attorney General, Tallahassee, and Bilal A. Faruqui, Assistant Attorney General, Tampa, for Petitioner. Howard L..
More
NOT FINAL UNTIL TIME EXPIRES TO FILE REHEARING
MOTION AND, IF FILED, DETERMINED
IN THE DISTRICT COURT OF APPEAL
OF FLORIDA
SECOND DISTRICT
STATE OF FLORIDA, )
)
Petitioner, )
)
v. ) Case No. 2D14-4283
)
AARON STAHL, )
)
Respondent. )
)
Opinion filed December 7, 2016.
Petition for Writ of Certiorari to the Circuit
Court for Sarasota County; Frederick P.
Mercurio, Judge.
Pamela Jo Bondi, Attorney General,
Tallahassee, and Bilal A. Faruqui, Assistant
Attorney General, Tampa, for Petitioner.
Howard L. Dimmig, II, Public Defender, and
Tosha Cohen, Assistant Public Defender,
Bartow, for Respondent.
BLACK, Judge.
The State seeks a writ of certiorari quashing the trial court's order denying
the State's motion to compel the production of the passcode to unlock Aaron Stahl's
cellphone. We grant the petition and quash the order.
I. Background
Stahl was charged with video voyeurism in violation of section
810.145(2)(c), Florida Statutes (2014), a third-degree felony. The probable cause
affidavit for Stahl's arrest stated that the victim was shopping in a store when she
observed a man crouching down with what she believed was a cellphone in his hand.
She saw that the screen of the cellphone was illuminated. She then observed the man
with his arm extended, holding the cellphone under her skirt. The victim confronted him,
and the man told her that he had dropped his cellphone. While yelling for assistance,
the victim attempted to detain the man, but he was able to free himself and flee the
store before assistance arrived.
Store surveillance video confirmed that the man crouched down with an
illuminated device in his hand, moving it toward the victim's skirt. It also showed the
man exit the store and get into a vehicle in the parking lot. Using the vehicle's license
plate number, law enforcement identified Stahl as the registered owner of the vehicle
and obtained his driver's license photo. Law enforcement positively identified Stahl as
the man in the surveillance video.
Stahl was arrested but a cellphone was not found on his person. During
an interview with law enforcement, Stahl admitted to being in the store, denied taking
inappropriate images, and verbally consented to a search of his cellphone, which he
-2-
identified as an Apple iPhone 5 located in his residence. After officers retrieved the
cellphone from Stahl's residence, Stahl withdrew his consent to search the phone.
The next day law enforcement sought a search warrant for the contents of
Stahl's cellphone. The search warrant affidavit described the phone as an Apple iPhone
5 with a cracked screen and a piece of glass missing from the top right corner. It also
listed the phone number associated with the phone and the service provider. The
search warrant affidavit provided that the victim believed the device in Stahl's hand to
be a cellphone and that when she confronted Stahl, he told the victim he had dropped
his cellphone. It further provided that Stahl initially consented to a search of his iPhone
5 and that he confirmed the phone number and provided the location of the phone. A
search warrant was issued for the contents of the described Apple iPhone 5.
However, the State was unable to execute the warrant and view the
contents of the phone because Stahl's cellphone is passcoded and he refused to give
law enforcement the passcode. As a result, the State filed a motion to compel
production of the passcode. The State alleged that without compelling Stahl to provide
the passcode, law enforcement's only option would be to send the phone to Apple to
obtain the passcode.1 The State also alleged that there is no Fifth Amendment
1
The State contended that sending the phone to Apple would create chain
of custody concerns because it did not "know who would have it at the manufacturer,
what they would have to do to get into it" and that timeliness was an issue because the
manufacturer indicated that the phone would be logged in to the system, only worked on
after receipt of a court order, and then shipped back. At the time the State filed its
motion, it was known that devices running certain versions of Apple's operating system
would permanently lock and potentially erase all of the device's content after ten failed
attempts to enter the passcode, but it was unknown that "[f]or all devices running iOS 8
and later versions, Apple will not perform iOS data extractions in response to
government search warrants because the files to be extracted are protected by an
encryption key that is tied to the user's passcode, which Apple does not possess."
-3-
implication in compelling Stahl to give officers the passcode in this case. 2 Stahl did not
file any response to the motion.
At the hearing on the State's motion to compel, neither side presented
testimony or evidence; only argument was presented. In denying the motion, the trial
court found that the Fifth Amendment privilege against self-incrimination applied such
that Stahl could not be compelled to produce the passcode. The court determined that
production of the passcode was testimonial and that the State had not sufficiently
established that the foregone conclusion doctrine applied.
The State appealed the order denying its motion, contending the order
was reviewable pursuant to Florida Rule of Appellate Procedure 9.140(c)(1)(B),
permitting State appeals from orders suppressing evidence obtained by search and
seizure.3 In response to an order to show cause why this case should not be dismissed
as from a nonfinal, nonappealable order, the State contended that if not appealable as
an order suppressing evidence, the order is reviewable by petition for writ of certiorari.
Privacy, Apple Inc., https://www.apple.com/privacy/government-information-requests/
(last visited Oct. 20, 2016). Unlike In re Order Requiring Apple, Inc. to Assist in the
Execution of a Search Warrant Issued by this Court,
149 F. Supp. 3d 341 (E.D. N.Y.
2016), the State is apparently unable to determine what iOS is installed on Stahl's
phone.
2
Nothing in our record establishes whether Stahl invoked his Fifth
Amendment privilege against self-incrimination or the State preemptively raised the
issue. See amend. V, U.S. Const.
3
Because a warrant has been issued allowing the State to search Stahl's
phone, the order denying the motion to compel is more akin to an order suppressing
evidence than to an order denying discovery. Cf. State v. Isaac,
696 So. 2d 813, 813
(Fla. 2d DCA 1997); State v. Foley,
193 So. 3d 24, 26 (Fla. 3d DCA 2016).
-4-
This court subsequently issued an order converting the appeal to a petition for writ of
certiorari and directing the parties to address the certiorari standard.
II. Standard of Review
The ability of the district courts of appeal to entertain
[S]tate petitions for certiorari to review pretrial orders in
criminal cases is important to the fair administration of
criminal justice in this state. Otherwise, there will be some
circumstances in which the [S]tate is totally deprived of the
right of appellate review of orders which effectively negate its
ability to prosecute. If a nonfinal order does not involve one
of the subjects enumerated in Florida Rule of Appellate
Procedure 9.140(c)(1), the [S]tate would not be able to
correct an erroneous and highly prejudicial ruling. Under
such circumstances, the [S]tate could only proceed to trial
with its ability to present the case significantly impaired.
Should the defendant be acquitted, the principles of double
jeopardy prevent the [S]tate from seeking review; thus, the
prejudice resulting from the earlier order would be
irreparable.
State v. Pettis,
520 So. 2d 250, 253 (Fla. 1988). Where the State has met the
jurisdictional requirements for a writ of certiorari—a ruling that significantly impairs the
State's ability to prosecute which could not be remedied via postjudgment appeal—and
has established that the trial court violated a clearly established principle of law,
issuance of a writ of certiorari is "an apt remedy." Id.; see also State v. Fernandez,
141
So. 3d 1211, 1216 (Fla. 2d DCA 2014) ("[T]he trial court's pretrial order would leave the
State without an effective remedy and cause irreparable harm. Accordingly, this is a
case where certiorari review is an 'apt remedy.' " (quoting
Pettis, 520 So. 2d at 253));
State v. Sandoval,
125 So. 3d 213, 215 (Fla. 4th DCA 2013) ("To obtain certiorari relief
from a pretrial evidentiary ruling, the [S]tate must show that the ruling was a violation of
a clearly established principle of law resulting in a miscarriage of justice."). Here, the
-5-
order is not appealable pursuant to rule 9.140(c)(1) and the State cannot appeal an
acquittal. See
Pettis, 520 So. 2d at 253.
Stahl was charged with the third-degree felony of video voyeurism by
"intentionally us[ing] an imaging device to secretly view, broadcast, or record under or
through the clothing being worn by another person, without that person's knowledge and
consent, for the purpose of viewing the body of, or the undergarments worn by, that
person" for his "amusement, entertainment, sexual arousal, gratification, or profit." §
810.145(2)(c). A necessary element of the crime is the use of an imaging device,
defined as "any mechanical, digital, or electronic viewing device; still camera;
camcorder; motion picture camera; or any other instrument, equipment, or format
capable of recording, storing, or transmitting visual images of another person." §
810.145(1)(b). Absent photographic or video evidence of the crime, the State's case
would rest solely on the victim's statements and the video surveillance depicting Stahl
moving a device in his hand toward the victim's skirt. It is apparent that the trial court's
ruling serves as a serious impediment to the State's case if it does not altogether
destroy it. The court's order denies the State the ability to execute an unchallenged
search warrant, effectively denying the State access to what is likely to be direct
evidence establishing elements of the charged offense. Cf. State v. Crumbley,
143 So.
3d 1059, 1065-66 (Fla. 2d DCA 2014) ("This appeal involves an order that prevents the
State from developing its evidence in the criminal case . . . . The order not only
suppresses the evidence, it seals the information so that the State can never know what
evidence is contained within the sealed documents.").
III. The hearing
-6-
At the hearing on the State's motion, the court began by asking various
questions. The court inquired "How do I know that there was a picture taken?" and
"What evidence are you asking me to rely on that gives me probable cause to believe a
picture was taken?" The State responded that a warrant had been issued for the
contents of the phone and probable cause was "not the issue at this point" but that
based on the circumstances, the State believed there were photographs or video taken,
based on the surveillance video and the victim's statements.4 The State then set forth
why the Fifth Amendment privilege against self-incrimination is not implicated,
identifying the three requirements necessary for a defendant to successfully invoke the
privilege. The State argued that there was no difference between the court finding
probable cause to issue the warrant and compelling Stahl to assist the State in "opening
up" the phone. The State further argued that law enforcement's forensic expert had
advised that he could not gain access to the phone because of the passcode and that if
he tried to enter every possible combination the phone could permanently lock and
potentially erase all of the contents.5
4
The trial court's focus on probable cause was misplaced. The State had
a search warrant for the contents of the phone. Stahl has not challenged the validity or
execution of that warrant. The only issue before the court was whether it could compel
Stahl to provide the passcode.
5
The State made no mention of whether it had attempted to compel Stahl
to unlock the phone using his fingerprint. At least one court has held that compelling a
witness to use his fingerprint to unlock or access his cellphone is not testimonial. See
Commonwealth v. Baust, 89 Va. Cir. 267 (Va. Cir. Ct. 2014). Nor has the State
attempted to compel Stahl to produce the contents of the phone without divulging the
passcode. Cf. In re Grand Jury Subpoena Duces Tecum Dated Mar. 25, 2011,
670
F.3d 1335 (11th Cir. 2012).
-7-
The court stated that while probable cause existed for the search warrant,
the State did not know "for sure" whether a photo or video was on the phone. The court
was incredulous that this was a case of first impression, but the State maintained that a
dearth of case law existed. The court asked whether the State knew if there was
additional security or encryption on the phone or the portion of the phone that stores
photographs. Attempting to focus the issue on whether the giving of the passcode itself
is testimonial, the State cited In re Grand Jury Subpoena Duces Tecum Dated March
25, 2011,
670 F.3d 1335 (11th Cir. 2012), for the principle that production of the
passcode would not be testimonial under the foregone conclusion doctrine—where the
location, existence, and authenticity of the requested information are known with
reasonable particularity. The State went so far as to agree to give Stahl immunity for
the act of providing the passcode. When pressed by the court, the State conceded that
"in the most technical sense" the court would be forcing Stahl to "use the contents of his
mind" in compelling him to provide the passcode.
Stahl argued that the State did not establish the three prongs of the
foregone conclusion doctrine. He contended that the State failed to establish location
because it was unable to prove that the phone in the State's possession is the phone
Stahl allegedly had at the store. He argued that the phone in the State's possession
came from a home in which multiple people lived and that the State presented no
evidence to show that the phone was Stahl's or that it was the phone from the store
surveillance.
In reply, the State argued that it did not have to meet the foregone
conclusion elements until it had been determined that the Fifth Amendment privilege
-8-
against self-incrimination was applicable. The State reiterated its position that the
privilege is not implicated because providing the passcode is not testimonial.
In its written order denying the State's motion, the court found that
production of the passcode would require the use of the contents of Stahl's mind and
was therefore testimonial. The court then found that the State had not satisfied the
reasonable particularity standard of the foregone conclusion doctrine.
IV. Analysis
A. The privilege
The Fifth Amendment to the United States Constitution provides in
pertinent part that "[n]o person . . . shall be compelled in any criminal case to be a
witness against himself[.]" Amend. V, U.S. Const. This privilege against self-
incrimination "protects a person only against being incriminated by his own compelled
testimonial communications." Doe v. United States,
487 U.S. 201, 207 (1988) (quoting
Fisher v. United States,
425 U.S. 391, 409 (1976)); see also Kessler v. State,
991 So.
2d 1015, 1021 (Fla. 4th DCA 2008) ("The Fifth Amendment privilege protects an
accused from being compelled to testify against himself, or otherwise provide the state
with evidence of a testimonial or communicative nature." (citing Schmerber v. California,
384 U.S. 757, 763 (1966))). "The word 'witness' in the constitutional text limits the
relevant category of compelled incriminating communications to those that are
'testimonial' in character." United States v. Hubbell,
530 U.S. 27, 34 (2000); see also
Heddon v. State,
786 So. 2d 1262, 1263 (Fla. 2d DCA 2001) (stating that the privilege
against self-incrimination "only precludes forcing an accused to produce incriminating
testimonial communications"). "[I]n order to be testimonial, an accused's
-9-
communication must itself, explicitly or implicitly, relate a factual assertion or disclose
information. Only then is a person compelled to be a 'witness' against himself."
Doe,
487 U.S. at 210 (footnote omitted).
In order for Stahl to have properly invoked his Fifth Amendment privilege
he needed to establish three things: (1) compulsion, (2) a testimonial communication or
act, and (3) incrimination. In re Grand Jury Subpoena Duces Tecum Dated Mar. 25,
2011, 670 F.3d at 1341 (In re Grand Jury). "Once an individual has invoked his
privilege against self-incrimination, it becomes the duty of the trial court to determine
whether there is a reasonable basis for the assertion of the privilege and whether the
privilege has been invoked in good faith." St. George v. State,
564 So. 2d 152, 155
(Fla. 5th DCA 1990). Because the State does not contend otherwise, for purposes of
this opinion, we presume that Stahl invoked the privilege.6
Although not expressly stated, it is apparent from the record and from the
State's filings with this court that the State concedes that producing the password to the
phone would be incriminatory. See Commonwealth v. Gelfgatt,
11 N.E.3d 605, 612
(Mass. 2014) ("[T]he entry of the encryption key or password presumably would be
incriminating because 'it would furnish the Government with a link in the chain of
6
Although the transcript of the proceedings below makes it clear that the
court did not require Stahl to establish the three components of the privilege but rather
assumed the privilege applied and placed the burden on the State to rebut or overcome
the claim, we recognize that the somewhat unusual procedural posture in which the
issue arose likely caused this burden shift. Cf. State v. Mitrani,
19 So. 3d 1065, 1068
(Fla. 5th DCA 2009) ("If a witness rightfully invokes the privilege against self-
incrimination, the State may overcome the claim of privilege . . . ."); In re Grand
Jury,
670 F.3d at 1341 ("An individual must show three things to fall within the ambit of the
Fifth Amendment . . . ."). Despite this apparent error, the State does not raise the
burden shift as a basis to grant certiorari relief.
- 10 -
evidence leading to [the defendant's] indictment.' " (second alteration in original)
(quoting
Doe, 487 U.S. at 207 n.5)). It also appears that the State has conceded that
producing the password would be compelled within the meaning of the privilege.7 Thus,
the crux of the State's argument below, and its argument as to the trial court's departure
from the essential requirements of the law, is whether the State sought protected
testimony from Stahl.
B. Act of Production
The Fifth Amendment privilege against self-incrimination has been held to
apply not only to verbal and written communications but also to the production of
documents, usually in response to a subpoena or summons, because the act of
production itself could communicate incriminatory statements. See
Fisher, 425 U.S. at
410. The courts that have addressed the Fifth Amendment implications for providing
decryption keys and passcodes have largely applied the act-of-production doctrine and
the foregone conclusion exception. See, e.g., Sec. & Exch. Comm'n v. Huang, No. 15-
269,
2015 WL 5611644, *1 (E.D. Penn. Sept. 23, 2015); United States v. Fricosu, 841
7
We do not believe it is at all clear that producing the password is
compelled within the meaning of the privilege because it is a "settled proposition that a
person may be required to produce specific documents even though they contain
incriminating assertions of fact or belief because the creation of those documents was
not 'compelled' " but was voluntary.
Hubbell, 530 U.S. at 35-36 (emphasis added); see
Fisher, 425 U.S. at 409-10. That is, Stahl may be required to produce the password
even though it may be testimonial and incriminate him because the creation of the
password was not compelled. Stahl is not being asked to cull through existing
documents and assemble a set of documents which he believes are responsive to the
subpoena—something newly created and compelled to be created pursuant to
subpoena. See In re Grand Jury Subpoena Duces Tecum Dated Oct. 29, 1992,
1 F.3d
87, 93 (2d Cir. 1993) ("Self-incrimination analysis now focuses on whether the creation
of the thing demanded was compelled and, if not, whether the act of producing it would
constitute compelled testimonial communication.").
- 11 -
F. Supp. 2d 1232, 1235 (D. Col. 2012); In re Grand Jury Subpoena to Boucher (In re
Boucher), 2:06-MJ-91,
2009 WL 424718, *2-3 (D. Vt. Feb. 19, 2009);
Gelfgatt, 11
N.E.3d at 612; Commonwealth v. Baust, 89 Va. Cir. 267 (Va. Cir. Ct. 2014). But see
United States v. Kirschner,
823 F. Supp. 2d 665, 669 (E.D. Mich. 2010) (concluding that
providing the password was testimony protected by the privilege against self-
incrimination).
Invoking the privilege still requires the accused to establish compulsion, a
testimonial communication, and incrimination. And as we have said, in this case
compulsion and incrimination are not at issue, leaving only the testimonial element.
Testimonial elements of production include (1) the existence of the documents, (2) the
accused's possession or control of the documents, and (3) the authenticity of the
documents.
Hubbell, 530 U.S. at 36.8
It bears repeating that the information sought by the State, that which it
would require Stahl to provide, is the passcode to Stahl's iPhone—the iPhone that the
State had a warrant to search based on probable cause that the phone was used in
Stahl's commission of the crime of video voyeurism. The State has not asked Stahl to
produce the photographs or videos on the phone.9 But the fact that the State sought
8
We note that the contents of Stahl's phone are neither at issue nor
privileged. See United States v. Doe,
465 U.S. 605, 612 (1984); In re Boucher,
2009
WL 424718 at *2.
9
Neither the State nor Stahl addresses the State's request as anything but
an act of production. This is likely because relevant—but not determinative—case law
addresses the privilege in the context of producing decrypted documents or files, clearly
acts of production. See, e.g,
Fricosu, 841 F. Supp. 2d at 1235 ("[T]he government
seeks a writ . . . requiring Ms. Fricosu to produce the unencrypted contents of the
computer."); In re Boucher,
2009 WL 424718 at *1 ("[T]he Government stated that it
does not in fact seek the password for the encrypted hard drive, but requires Boucher to
- 12 -
production of the passcode itself and not production of the contents of Stahl's phone
does not resolve the issue before us because the State does not contend the court
departed from the requirement of law by applying the act-of-production doctrine.
"The difficult question whether a compelled communication is testimonial
for purposes of applying the Fifth Amendment often depends on the facts and
circumstances of the particular case."
Doe, 487 U.S. at 214-15. Here, the trial court
rested its determination that producing the passcode would be testimonial exclusively
on the concept that production would require "the use of the contents" of Stahl's mind.
The phrase "the contents of the accused's mind" has often been repeated in cases
discussing the privilege. See, e.g.,
Hubbell, 530 U.S. at 43;
Doe, 487 U.S. at 211; In re
Grand
Jury, 670 F.3d at 1345;
Kirschner, 823 F. Supp. 2d at 669. And although the trial
court correctly quoted the Eleventh Circuit's statement in In re Grand Jury, that "[t]he
touchstone of whether an act of production is testimonial is whether the government
compels the individual to use 'the contents of his own mind' to explicitly or implicitly
communicate some statement of
fact," 670 F.3d at 1345, the trial court did not consider
the law as stated in Hubbell and Doe—that the contents of the accused's mind must be
"extensive[ly] use[d]" in creating the response,
Hubbell, 530 U.S. at 43, or must "relat[e]
produce the contents of his encrypted hard drive in an unencrypted format by opening
the drive before the grand jury.");
Gelfgatt, 11 N.E.3d at 612 ("The Commonwealth . . .
is seeking to compel the defendant to decrypt 'all' of the 'digital storage devices that
were seized from him.' "). And it is not entirely clear from the record whether the State
wants Stahl to testify to the passcode or to enter it into the phone. Cf.
Gelfgatt, 11
N.E.3d at 611. If the former, the State's request could be considered under the
traditional analysis of the self-incrimination privilege—that of verbal communications.
- 13 -
him to the offense,"
Doe, 487 U.S. at 2013.10 That is, "it is not enough that the
compelled communication is sought for its content. The content itself must have
testimonial significance."
Doe, 487 U.S. at 211 n.10 (emphasis added) (first citing
Fisher, 425 U.S. at 408; then citing Gilbert v. California,
388 U.S. 263, 267 (1967); and
then citing United States v. Wade,
388 U.S. 218, 222 (1967)).
In this case, the communication was sought only for its content and the
content has no other value or significance.11 By providing the passcode, Stahl would
not be acknowledging that the phone contains evidence of video voyeurism. See
Doe,
487 U.S. at 215. Moreover, although the passcode would allow the State access to the
phone, and therefore to a source of potential evidence, the State has a warrant to
search the phone—the source of evidence had already been uncovered. See
id.
Providing the passcode does not "betray any knowledge [Stahl] may have about the
circumstances of the offenses" for which he is charged. See
id. at 219 (Stevens, J.,
dissenting). It does not implicitly "relate a factual assertion or disclose information."
10
Although the phrase "the use of the contents of the accused's mind" has
been used in act-of-production cases, we note that the case cited by the Eleventh
Circuit for its proposition that the use of the contents of the accused's mind is the
touchstone of whether an act of production is testimonial does not so hold. Curcio v.
United States,
354 U.S. 118 (1957), provides that there "is a great difference" between
compelled production of documents and compelled testimony, specifying that testifying
as to the location of documents "requires him to disclose the contents of his own mind."
Id. at 127-28.
11
We recognize that the court in Kirschner reached the opposite
conclusion, but because Kirschner provides no facts regarding the crimes or evidence
linking Kirschner to the computer and the computer to the crimes, we cannot discuss
the case except to say that our reading of the cases relied upon in Kirschner leads to
the conclusion that the statement must have value beyond its actual content. We
believe the facts here set forth one of the "very few instances in which a verbal
statement, either oral or written, will not convey information or assert facts," and
therefore would not be testimonial. Cf.
Doe, 487 U.S. at 213.
- 14 -
Doe, 487 U.S. at 210, 215. Thus, "compelling a suspect to make a nonfactual
statement that facilitates the production of evidence" for which the State has otherwise
obtained a warrant based upon evidence independent of the accused's statements
linking the accused to the crime does not offend the privilege. See
id. at 213 n.11. "If a
compelled statement is 'not testimonial and for that reason not protected by the
privilege, it cannot become so because it will lead to incriminating evidence.' "
Id. at
208-09 n.6 (quoting In re Grand Jury Subpoena,
826 F.2d 1166, 1172 n.2 (2d Cir. 1987)
(Newman, J., concurring)). The trial court's reliance solely on the passcode being the
contents of Stahl's mind was a departure because the standard requires something
more.
That an accused may be "forced to surrender a key to a strongbox
containing incriminating documents," but he cannot "be compelled to reveal the
combination to his wall safe,"
Doe, 487 U.S. at 219 (Stevens, J., dissenting), is another
often repeated quote. See, e.g.,
Hubbell, 530 U.S. at 43;
Doe, 487 U.S. at 210 n.9; In
re Grand
Jury, 670 F.3d at 1345;
Kirschner, 823 F. Supp. 2d at 669. Despite the many
cases referencing the quote, we have found none that provide details of "surrender[ing]
a key." We question whether identifying the key which will open the strongbox—such
that the key is surrendered—is, in fact, distinct from telling an officer the combination.
More importantly, we question the continuing viability of any distinction as technology
advances. See
Fisher, 425 U.S. at 407 ("Several of Boyd[ v. United States,
116 U.S.
616 (1886)]'s express or implicit declarations have not stood the test of time."). In that
respect, we are not inclined to believe that the Fifth Amendment should provide greater
protection to individuals who passcode protect their iPhones with letter and number
- 15 -
combinations than to individuals who use their fingerprint as the passcode. Compelling
an individual to place his finger on the iPhone would not be a protected act; it would be
an exhibition of a physical characteristic, the forced production of physical evidence, not
unlike being compelled to provide a blood sample or provide a handwriting exemplar.
See
Hubbell, 530 U.S. at 35 (and cases cited therein); see also Baust, 89 Va. Cir. 267
at *4.12
C. Foregone Conclusion
However, even the testimonial communication implicit in the act of
production does not rise "to the level of testimony within the protection of the Fifth
Amendment" where the State has established, through independent means, the
existence, possession, and authenticity of the documents.
Fisher, 425 U.S. at 411.
That is, by implicitly admitting the existence of the evidence requested and that it is in
the accused's possession the accused "adds little or nothing to the sum total of the
Government's information"; the information provided is a foregone conclusion.
Id. "In
12
These considerations, we believe, allow for the balance spoken of in
Doe and Schmerber, among others. See
Doe, 487 U.S. at 213 ("Even if some of the
policies underlying the privilege might support petitioner's interpretation of the privilege,
'it is clear that the scope of the privilege does not coincide with the complex of values it
helps to protect. Despite the impact upon the inviolability of the human personality, and
upon our belief in an adversary system of criminal justice in which the Government must
produce the evidence against an accused through its own independent labors, the
prosecution is allowed to obtain and use . . . evidence which although compelled is
generally speaking not "testimonial" . . . .' " (quoting Marchetti v. United States,
390 U.S.
62, 72 (1968) (Brennan J., concurring)));
Schmerber, 384 U.S. at 762-63 ("[T]he
privilege has never been given the full scope which the values it helps to protect
suggest. History and a long line of authorities in lower courts have consistently limited
its protection to situations in which the State seeks to submerge those values by
obtaining the evidence against an accused through 'the cruel, simple expedient of
compelling it from his own mouth.' ").
- 16 -
essence, under the 'foregone conclusion' exception to the Fifth Amendment privilege,
the act of production does not compel a defendant to be a witness against himself."
Gelfgatt, 11 N.E.3d at 615.
In order for the foregone conclusion doctrine to apply, the State must
show with reasonable particularity that, at the time it sought the act of production, it
already knew the evidence sought existed, the evidence was in the possession of the
accused, and the evidence was authentic. In re Grand
Jury, 670 F.3d at 1344.13
Although the State need not have "perfect knowledge" of the requested evidence, it
"must know, and not merely infer," that the evidence exists, is under the control of
defendant, and is authentic. United States v. Greenfield, No. 15-543,
2016 WL
4073250, *6-7 (2d Cir. Aug. 1, 2016). Where the foregone conclusion exception
applies, "[t]he question is not of testimony but of surrender."
Fisher, 425 U.S. at 411
(quoting In re Harris,
221 U.S. 274, 279 (1911)).
To know whether providing the passcode implies testimony that is a
foregone conclusion, the relevant question is whether the State has established that it
knows with reasonable particularity that the passcode exists, is within the accused's
possession or control, and is authentic. See In re Boucher,
2009 WL 424718 at *3
("The Government thus knows of the existence and location of the Z drive and its files."
(emphasis added)). But see Baust, 89 Va. Cir. 267 ("Contrary to the Commonwealth's
assertion, the password is not a foregone conclusion because it is not known outside of
13
As noted by the Eleventh Circuit, at the time it adopted the "reasonable
particularity" standard, the Ninth and D.C. Circuits had also adopted the standard. In re
Grand
Jury, 670 F.3d at 1344 n.20. The Second Circuit has also adopted the standard.
United States v. Greenfield, No. 15-543,
2016 WL 4073250, *6 (2d Cir. Aug. 1, 2016).
- 17 -
Defendant's mind." (emphasis added)). The question is not the State's knowledge of
the contents of the phone; the State has not requested the contents of the phone or the
photos or videos on Stahl's phone. Cf. In re Grand
Jury, 670 F.3d at 1346-47
(concluding that "[n]othing in the record before us reveals that the Government knows
whether any files exist and are located on the hard drives" where the Government
requested production of the contents of the hard drives).14 But see Huang,
2015 WL
5611644 at *3 (stating that, where the SEC sought passcodes and not the contents of
the smartphones, "the SEC proffers no evidence rising to a 'reasonable particularity' any
of the documents it alleges reside in the passcode protected phones." (emphasis
added)). The State established that the phone could not be searched without entry of a
passcode. A passcode therefore must exist. It also established, with reasonable
particularity based upon cellphone carrier records and Stahl's identification of the phone
and the corresponding phone number, that the phone was Stahl's and therefore the
passcode would be in Stahl's possession. That leaves only authenticity. And as has
been seen, the act of production and foregone conclusion doctrines cannot be
seamlessly applied to passcodes and decryption keys. If the doctrines are to continue
to be applied to passcodes, decryption keys, and the like, we must recognize that the
technology is self-authenticating—no other means of authentication may exist. Cf.
Greenfield,
2016 WL 4073250 at *8 (recognizing "[i]mplicit authentication" of documents
14
The Eleventh Circuit explained that the subpoena at issue directed Doe
to appear before a grand jury "and produce the unencrypted contents" of hard drives
and "any and all containers or folders thereon." In re Grand
Jury, 670 F.3d at 1339.
The hard drives were seized pursuant to a warrant, which presumably also allowed the
Government to search the drives. The focus of the Government's request was the
contents of the drives, not the decryption key.
- 18 -
(alteration in original) (quoting United States v. Fox,
721 F.2d 32, 38 (2d Cir. 1983))). If
the phone or computer is accessible once the passcode or key has been entered, the
passcode or key is authentic.
V. Conclusion
The trial court departed from the requirements of the law by considering
only part of the standard used to determine whether a communication is testimonial and
by burdening the State with proving the existence of incriminating content on Stahl's
phone when that was not at issue. It further departed by requiring the State to establish
existence beyond the reasonable particularity standard. Unquestionably, the State
established, with reasonable particularity, its knowledge of the existence of the
passcode, Stahl's control or possession of the passcode, and the self-authenticating
nature of the passcode.15 See In re Boucher,
2009 WL 424718 at *3. This is a case of
surrender and not testimony.
Petition granted; order quashed.
SALARIO, J., Concurs.
KELLY, J., Concurs in result only.
15
Given the State's evidence and the fact that it met the standard
necessary to obtain a search warrant for Stahl's iPhone, we would be inclined to find
that the State had met the reasonable particularity standard for even the contents of
Stahl's phone. The State knew Stahl was the individual in the store surveillance video
holding an imaging device, which the victim identified as a phone; it knew that the
evidence would be a photo or video file; and it knew the evidence would be authentic
based upon the store surveillance video. However, nothing about our conclusion
prevents Stahl from filing a motion to suppress any evidence found on the phone based
on the validity of the warrant. See, e.g., Baust, 89 Va. Cir. 267 ("[T]he contents of the
phone, obtained pursuant to a validly executed warrant are only subject to objections
raised under the Fourth Amendment, not the Fifth Amendment." (emphasis omitted)).
- 19 -