SPINA, J.
On May 5, 2010, a State grand jury returned indictments charging the defendant with seventeen counts of forgery of a document, G. L. c. 267, § 1; seventeen counts of uttering a forged instrument, G. L. c. 267, § 5; and three counts of attempting to commit the crime of larceny by false pretenses of the property of another, G. L. c. 274, § 6. The charges arose from allegations that the defendant, through his use of computers, conducted a sophisticated scheme of diverting to himself funds that were intended to be used to pay off large mortgage loans on residential properties. On November 21, 2011, the Commonwealth filed in the Superior Court a "Motion to Compel the Defendant to Enter His Password into Encryption Software He Placed on Various Digital Media Storage Devices that Are Now in the Custody of the Commonwealth" (motion to compel decryption). The Commonwealth also filed a motion to report a question of law to the Appeals Court prior to trial pursuant to Mass. R. Crim. P. 34, as amended, 442 Mass. 1501 (2004). The question concerned the lawfulness of compelling the defendant to privately enter an encryption key into computers seized from
We transferred the case to this court on our own motion.
1. Background. The undisputed facts are taken from the parties' submissions to the motion judge.
Beginning in 2009, the defendant, who is an attorney, allegedly
The defendant fostered the illusion that Puren Ventures and Baylor Holdings were actual companies by giving each one Internet-based telephone and facsimile numbers. When a closing attorney would contact one of these companies to request a statement documenting the sum necessary to pay off the reassigned mortgage, the attorney would be instructed to send the request to the facsimile number that the defendant had created. Next, the defendant would request an actual payoff figure from the true mortgage holder. The defendant would transmit this information by Internet facsimile number to the closing attorney, doing so under the guise of the sham company. The defendant would instruct the closing attorney to send the payoff check to a Boston address where the defendant once had practiced law. Although ultimately unsuccessful, the defendant purportedly created seventeen fraudulent assignments of mortgages, totaling over $13 million. According to the Commonwealth, the defendant relied heavily on the use of computers to conceal his identity and perpetrate his alleged scheme.
On December 17, 2009, State police troopers arrested the
According to the Commonwealth, the encryption software on
On the day of his arrest, the defendant was interviewed by law enforcement officials after having been advised of the Miranda rights. In response to questioning, he said that he had more than one computer in his home. The defendant also informed the officials that "[e]verything is encrypted and no one is going to get to it." In order to decrypt the information, he would have to "start the program." The defendant said that he used encryption for privacy purposes, and that when law enforcement officials asked him about the type of encryption used, they essentially were asking for the defendant's help in putting him in jail. The defendant reiterated that he was able to decrypt the computers, but he refused to divulge any further information that would enable a forensic search.
On November 21, 2011, the Commonwealth filed its motion to compel decryption pursuant to Mass. R. Crim. P. 14 (a) (2), as appearing in 442 Mass. 1518 (2004). It sought an order compelling the defendant's compliance with a "protocol" that the Commonwealth had established to obtain decrypted digital data.
In denying the Commonwealth's motion to compel decryption, the judge said that, on the one hand, the Commonwealth merely was requesting a sequence of numbers and characters that would enable it to access information on the computers, but that, on the other hand, the Commonwealth was asking for the defendant's help in accessing potentially incriminating evidence that the Commonwealth had seized. In the judge's view, there was merit to the defendant's contention that production of a password to decrypt the computers constituted an admission of knowledge, ownership, and control. Further, the judge continued, the scenario presented in this case was far different from compelling
2. Decryption under the Fifth Amendment. The Commonwealth contends that compelling the defendant to enter his encryption key into the computers pursuant to the Commonwealth's protocol would not violate the defendant's Fifth Amendment right against self-incrimination. In the Commonwealth's view, the defendant's act of decryption would not communicate facts of a testimonial nature to the government beyond what the defendant already has admitted to investigators. As such, the Commonwealth continues, the defendant's act of decryption does not trigger Fifth Amendment protection. We agree.
The Fifth Amendment provides that "[n]o person ... shall be compelled in any criminal case to be a witness against himself."
Here, the Commonwealth, through its motion, is seeking to compel the defendant to decrypt "all" of the "digital storage devices that were seized from him." Given that the Commonwealth believes that those devices contain information about the defendant's alleged mortgage payoff scheme, the entry of the encryption key or password presumably would be incriminating because "it would furnish the Government with a link in the chain of evidence leading to [the defendant's] indictment." Doe v. United States, 487 U.S. 201, 207 n.5 (1988), and accompanying text. The issue on which this case turns is whether the defendant's act of decrypting the computers is a testimonial communication that triggers Fifth Amendment protection.
Although the Fifth Amendment privilege typically applies to oral or written statements that are deemed to be testimonial, United States v. White, 322 U.S. 694, 698 (1944), the act of producing evidence demanded by the government may have "communicative aspects" that would render the Fifth Amendment applicable. Fisher, 425 U.S. at 410. See Hubbell, 530 U.S. at 36. See also Commonwealth v. Burgess, 426 Mass. 206, 211 (1997) ("The Fifth Amendment privilege against self-incrimination applies not only to verbal communications, but... also to nonverbal acts that imply assertions"). Whether an act of production is testimonial depends on whether the government compels the individual to disclose "the contents of his own mind" to explicitly or implicitly communicate some statement of fact. Hubbell, supra at 43, quoting Curcio v. United States, 354 U.S. 118, 128 (1957). See Doe v. United States, 487 U.S. at 213 (Fifth Amendment intended "to spare the accused from having to reveal, directly or indirectly, his knowledge of
It is well established that not all acts of production have communicative aspects such that they will be deemed testimonial. See Hubbell, 530 U.S. at 34-35; Doe v. United States, 487 U.S. at 210-211. Significantly, the Fifth Amendment privilege is not triggered where the government seeks to compel an individual to be the source of real or physical evidence by, for example, furnishing a blood sample, Schmerber v. California, 384 U.S. at 764-765; producing a voice exemplar, United States v. Dionisio, 410 U.S. 1, 5-7 (1973); standing in a lineup, United States v. Wade, 388 U.S. 218, 221-223 (1967); providing a handwriting exemplar, Gilbert v. California, 388 U.S. 263, 266-267 (1967); or putting on particular clothing, Holt v. United States, 218 U.S. 245, 252-253 (1910). See Commonwealth v. Brennan, 386 Mass. 772, 776-777 (1982) (breathalyzer test and field sobriety tests do not produce evidence of testimonial nature). The Fifth Amendment privilege is not implicated in these circumstances because the individual is "not required `to disclose any knowledge he might have,' or `to speak his guilt.'" Doe v. United States, supra at 211, quoting United States v. Wade, supra at 222-223. See Hubbell, supra at 35 ("The act of exhibiting such physical
Here, the defendant's act of entering an encryption key in the computers seized by the Commonwealth would appear, at first blush, to be a testimonial communication that triggers Fifth Amendment protection. By such action, the defendant implicitly would be acknowledging that he has ownership and control of the computers and their contents.
The "foregone conclusion" exception to the Fifth Amendment privilege against self-incrimination provides that an act of production does not involve testimonial communication where the facts conveyed already are known to the government, such that the individual "adds little or nothing to the sum total of the Government's information." Fisher, 425 U.S. at 411. For the exception to apply, the government must establish its knowledge of (1) the existence of the evidence demanded; (2) the possession or control of that evidence by the defendant; and (3) the authenticity of the evidence. See id. at 410-413; United States v.
Based on our review of the record, we conclude that the factual statements that would be conveyed by the defendant's act of entering an encryption key in the computers are "foregone conclusions" and, therefore, the act of decryption is not a testimonial communication that is protected by the Fifth Amendment. The investigation by the corruption, fraud, and computer crime division of the Attorney General's office uncovered detailed evidence that at least two mortgage assignments to Baylor Holdings were fraudulent. During his postarrest interview with State
When considering the entirety of the defendant's interview with Trooper Johnson, it is apparent that the defendant was engaged in real estate transactions involving Baylor Holdings, that he used his computers to allegedly communicate with its purported owners, that the information on all of his computers pertaining to these transactions was encrypted, and that he had the ability to decrypt the files and documents. The facts that would be conveyed by the defendant through his act of decryption — his ownership and control of the computers and their contents, knowledge of the fact of encryption, and knowledge of the encryption key — already are known to the government and, thus, are a "foregone conclusion."
3. Decryption under art. 12. The Commonwealth also contends that compelling the defendant to enter his encryption key
Article 12 provides that "[n]o subject shall ... be compelled to accuse, or furnish evidence against himself." It is well established that art. 12 affords greater protection against self-incrimination than does the Fifth Amendment in circumstances that are "discrete and well defined."
Similarly, we have held that, as is the case under the Federal Constitution, "the act of production, quite apart from the content of that which is produced, may itself be communicative." Commonwealth v. Doe, 405 Mass. 676, 679 (1989). See Commonwealth v. Hughes, 380 Mass. at 592. Where the information conveyed by an act of production "is reflective of the knowledge, understanding, and thoughts of the witness," it is deemed to be
In Commonwealth v. Burgess, 426 Mass. at 219, when the court considered the scope of the protection against self-incrimination afforded by both the Federal Constitution and the Massachusetts Declaration of Rights, we pointed out that our analysis under art. 12 need not "merely duplicate our earlier Fifth Amendment analysis." Rather, "[w]e are free to consider certain evidence, considered by the Supreme Court to be insufficiently testimonial for Fifth Amendment purposes, to be sufficiently testimonial for art. 12 purposes." Id. Mindful of this pronouncement, as well as our jurisprudence recognizing the "foregone conclusion" principle, we are not persuaded that the circumstances presented here dictate an analytical departure from the Federal standard. Where the facts that would be conveyed by the defendant through the act of entering an encryption key into the computers seized by the Commonwealth are a "foregone conclusion," his act of production is insufficiently testimonial for art. 12 purposes.
4. Conclusion. We answer the reported question, "Yes, where the defendant's compelled decryption would not communicate facts of a testimonial nature to the Commonwealth beyond what the defendant already had admitted to investigators." The judge's denial of the Commonwealth's motion to compel decryption is reversed, and this case is remanded to the Superior Court for further proceedings consistent with this opinion.
So ordered.
The court holds today that the defendant, an attorney who practices from his home, may be ordered to enter decryption keys sequentially on each and every electronic device seized from his home, his home office, and his automobile, in order to provide law enforcement officers with unencrypted access to those devices.
1. Act of production and authentication. The court concludes that the act of decrypting the devices pursuant to the Commonwealth's proposed protocol, which necessarily would produce in unencrypted form any files stored thereon to which the encryption key would permit access, is not analogous to the act of responding to a subpoena to produce a document, where the act of production would be testimonial because it makes an assertion that, among other things, the document produced is authentic. To reach this conclusion, the court adopts the Commonwealth's contention that, by decrypting the computers and thereby producing their unencrypted contents, the defendant would be asserting only his ability to decrypt the devices. On this view, he would not be asserting that he owned them, had exclusive use and control of them, or was familiar with any of the files on them; that certain files contained the incriminating evidence sought; or that the documents were authentic. Such is far from the case.
In taking this view of the matter, the court maintains that the defendant merely would be entering a password, which he would not disclose to the Commonwealth, into the encryption program, and would not thereby be selecting and producing any documents. Such an artificial distinction between the act of entering the decryption key and the inevitable result of decrypting the devices,
Moreover, the defendant has denied that there are any documents related to Baylor Holdings, Ltd. (Baylor), on that subset of the seized devices of which he has acknowledged ownership, denied that he created any documents for Baylor,
In light of all this, I would conclude that both the acts of
2. Foregone conclusion. The court concludes that the act of entering the codes to decrypt the devices would not infringe upon the defendant's privilege against self-incrimination. The court is of the view that the defendant already has disclosed during an interview with State troopers anything that, absent such disclosures, might be testimonial about the act of decryption. In particular, the court concludes that the facts which might be learned through the act of decryption — ownership and control
"The touchstone of whether an act of production is testimonial is whether the government compels the individual to use `the contents of his own mind' to explicitly or implicitly communicate some statement of fact." In re Subpoena Duces Tecum, 670 F.3d at 1345, quoting Curcio v. United States, 354 U.S. 118, 128 (1957). Under the foregone conclusion doctrine, an otherwise testimonial act of production is not testimonial if the government establishes that, at the time it sought the compelled production, it already knew of that which would explicitly or implicitly be conveyed by the production. Fisher v. United States, 425 U.S. 391, 410-411 (1976) (Fisher). See Hubbell, supra at 36 n.19, 43-45 (act of production testimonial if by compelled conduct "the witness would admit that the papers existed, were in his possession or control, and were authentic"; inquiry turns on extent of government's prior knowledge of existence and location of documents produced); United States v. Ponds, 454 F.3d 313, 320-321 (D.C. Cir. 2006).
a. Reasonable particularity standard. In addressing the extent of knowledge that the government must establish in order to invoke the "foregone conclusion" doctrine, four circuit courts of the United States Court of Appeals have concluded that the government must show with "reasonable particularity" that it already knows the "location, existence, and authenticity of the purported evidence." In re Subpoena Duces Tecum, 670 F.3d at 1344 & n.20. See United States v. Ponds, supra at 320-321; In re Grand Jury Subpoena Dated April 18, 2003, 383 F.3d 905, 910 (9th Cir. 2004); In re Grand Jury Subpoena Duces Tecum Dated October 29, 1992, 1 F.3d 87, 93 (2d Cir. 1993), cert. denied sub nom. Doe v. United States, 510 U.S. 1091 (1994).
Treating computer files as documents, the United States Court of Appeals for the Eleventh Circuit is, to date, the only circuit court to have addressed the issue specifically in the context of
While the United States Court of Appeals for the First Circuit has yet to consider the issue, I would adopt, at a minimum for purposes of art. 12, the same reasonable particularity standard for establishing a foregone conclusion that other circuit courts have adopted, and would conclude that the Commonwealth has not met that burden here. See id. at 1346, 1349 (no evidence "that the Government, at the time it sought to compel production, knew to any degree of particularity what, if anything, was hidden behind the encrypted wall"). Contrast United States v. Fricosu, 841 F.Supp.2d 1232, 1235-1237 (D. Colo. 2012) (existence and location of files foregone conclusion where government introduced recorded conversation of defendant and third party in which she said that file sought "was on my laptop").
b. Extent of government's knowledge in this case. Here, the Commonwealth has made no showing that the existence, possession, and authenticity of the broad categories of items sought are foregone conclusions, under any definition of that term. The court focuses on the defendant's apparent access to the devices seized, and his statements that he owns a "laptop," that "everything is encrypted," and that he could decrypt at least one device ("my computer"). In so doing, it conflates the probable
Even under the less specific requirements articulated in Hubbell, supra, moreover, the government's burden of establishing that, at the time it sought to compel decryption and production, it already knew of the documents sought, rendering any testimonial aspect of that conduct a foregone conclusion, is not met by a showing that a defendant had in his house what is essentially a locked file cabinet in which such documents might have been kept. See In re Subpoena Duces Tecum, 670 F.3d at
i. Existence and content of documents sought. Aside from knowledge pertinent to the existence and nature of the encryption program itself,
"In Fisher, [supra at 411,] ... the act of production was not testimonial because the Government had knowledge of each fact that had the potential of being testimonial. As a contrast, the Court in Hubbell[, supra at 44-45,] found there was testimony in the production of the documents since the Government had no knowledge of the existence of documents, other than a suspicion that documents likely existed and, if they did exist, that they would fall within the broad categories requested." In re Subpoena Duces Tecum, 670 F.3d at 1345. Here, too, the government has no more than a suspicion that broad categories of documents, extending over periods of years, may exist on one or more of the seized devices. See United States v. Doe, 465 U.S. 605, 613-614 & nn.11-13 (1984). See, e.g., Commonwealth v. Hughes, 380 Mass. 583, 592, cert. denied, 449 U.S. 900 (1980) (act of producing gun by defendant charged with assault by means of dangerous weapon would not convey "merely trivial new knowledge" but would communicate "just those matters about which the Commonwealth desires but does not have solid information"). Contrast Fisher, supra.
Furthermore, the court misconstrues the extent of the defendant's statements concerning the encryption, thereby inferring that the defendant has asserted greater access and control than is in fact the case. The court conflates the encryption of the disk drive on one of the computers, which the defendant acknowledged, with the existence of the encrypted communication program
On this record, the Commonwealth does not know what is stored on any of the seized devices, or if any of them contain information relevant to the charged offenses. Notwithstanding the court's conclusion to the contrary, the affidavit in support of the search warrant and the defendant's statements to police do not give rise to a foregone conclusion that whatever would be revealed by the defendant's entry of the decryption key, and consequent production of the unencrypted contents of all of the
Even more fundamentally, to establish a foregone conclusion the government must first show that it knows any files at all exist on a particular computer. In In re Subpoena Duces Tecum, 670 F.3d at 1346, 1349, the United States Court of Appeals for the Eleventh Circuit reversed an order requiring a suspect to decrypt his computer, which was using the same type of encryption program that the Commonwealth's expert avers is being used to encrypt the devices here, because the court concluded that the government had not shown that any files existed on the computer, other than the encryption program itself. The encryption program at issue not only encrypts information stored on a computer, it also encrypts all unused space on the computer's hard drive, making it impossible to determine how much of the computer contains actual files and how much is unused or blank. Because the government could not show that any data on the computer represented actual files, the court concluded that ("[t]he [g]overnment has failed to show any basis, let alone shown a basis with reasonable particularity, for its belief that encrypted files exist on the drives ..."). Id. at 1349. Given the properties of the encryption program in place on the seized devices here, as described by the Commonwealth's expert, the Commonwealth does not know whether they contain any documents of any kind.
ii. Ownership, exclusive use, and control. The court's decision also conflates access to a particular computer
3. Attorney-client privilege. I would conclude also that the defendant cannot be compelled to enter the decryption key, and thereby produce all documents to which he has access, on each device, under the protocol as proposed by the Commonwealth, because of the possibility that the computers contain privileged information relating to the defendant's legal clients. See Preventive Medicine Assocs. v. Commonwealth, 465 Mass. 810, 822-824 & nn.24-26 (2013) ("a search, to be reasonable, must include reasonable steps designed to prevent a breach of the attorney-client privilege.... [T]he harm to the defendant could be irreparable if the Commonwealth viewed privileged materials, even if only by accident"). The issue of attorney-client privilege is not addressed in the search warrant affidavit, the protocol proffered in conjunction with the Commonwealth's motion to compel, or the court's decision.
The defendant told police that he ran a law office from his house, and that he had approximately ten active personal injury clients. He stated that he sent facsimile transmissions to his personal injury clients, when necessary, using TrustFax, an Internet
4. Conclusion. Because I believe that the compelled decryption and production here is fundamentally testimonial, and the Commonwealth has not established a foregone conclusion that the existence, location, and authenticity of the information that would be produced is known to the government, I respectfully dissent, and would answer the reported question, "No."
At the hearing on the motion to compel decryption, the Commonwealth stated that it "would be seeking to introduce the fact of encryption in order to suggest consciousness of guilt."
It does not follow, however, that further restrictions should be placed on fundamental protections provided by the Fifth Amendment and art. 12, which heretofore have been enforced by both State and Federal courts, because the prevalence of computers, in this digital age, at times may facilitate the commission of crimes. The omnipresence of electronic devices which may be monitored, tracked, and recorded has likewise afforded unparalleled opportunities to law enforcement officers in their pursuit of criminal investigations. That encryption may at times present significant difficulties to law enforcement officers does not, as the Commonwealth suggests, result in a conclusion that the Fifth Amendment privilege should be restricted so that enforcement is made easier. See Blaisdell v. Commonwealth, 372 Mass. 753, 761 (1977) ("Where the privilege is applicable, the constitutionally required result is that no balancing of State-defendant interests is permissible to facilitate the admittedly difficult burdens of the prosecution"). See also Commonwealth v. Doe, 405 Mass. 676, 680 (1989).
The affidavit also recounts police observations of the defendant suspected to be using publicly available and "anonymous" wireless Internet services, which allow access to the Internet without identifying a particular user's Internet Protocol (IP) address, from a variety of locations, such as restaurants. These suspicions are based largely on his presence at particular times at locations where such services are available, or in nearby parking lots, and, on two occasions, because he was observed apparently using a laptop.
The defendant, who is a native of Russia, obtained the program at a financial conference in Europe sometime in 2004, 2005, or 2006, because he intended to develop his business in the Russian market; he believed that encrypted communication was necessary to address Russian security concerns. In response to an explicit question, the defendant answered that he did not know whether the communication program saved the contents of any conversation on a computer drive, then clarified that the communication program did not save any of the typed conversations, but, rather, deleted them at the end of a communication session, and that he thought it did not store copies of the conversations because it was intended to be secure.