Computers, Privacy & the Constitution

View   r6  >  r5  ...
VictorAFirstPaper 6 - 01 May 2013 - Main.VictorA
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
Changed:
<
<

Forced Decryption and the 5th Amendment

>
>

Forced Decryption and the 5th Amendment

 On February 23, 2012, the Wall Street Journal and Volokh Conspiracy reported that the Court of Appeals for the Eleventh Circuit decided that forcing a suspect to decrypt and provide a hard drive when the government did not already know what it contained violates the suspect’s Fifth Amendment protection against self-incrimination. While most of the Court’s analysis seems correct, I have a few problems with some parts.
Added:
>
>

Facts of the Case

 The facts of the case, In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, are as follows. The government served a subpoena duces tecum on the suspect (“Doe”), compelling him to produce the unecrypted contents located on the hard drives of his laptop computers and five external hard drives. In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335, 1337 (11th Cir. 2012). Doe refused to comply with the subpoena, instead invoking his Fifth Amendment right against self-incrimination. Id. at 1338. The U.S. Attorney applied to the district court for an order that would grant Doe immunity and require him to respond to the subpoena. Id. The court rejected Doe’s explanations, judged him to be in contempt of court, and ordered him incarcerated. Id.
Added:
>
>

The 11th Circuit's Opinion

 The 11th Circuit arrived at two overall conclusions. First, the district court erred in concluding that Doe’s act of decryption and production did not constitute testimony. Second, “in granting Doe immunity, the court erred in limiting his immunity, under 18 U.S.C. §§ 6002 and 6003, to the Government’s use of his act of decryption and production, but allowing the Government derivative use of the evidence such act disclosed.” Id. at 1341. I will be focusing on the first issue—“whether the act of production may have some testimonial quality sufficient to trigger Fifth Amendment protection when the production explicitly or implicitly conveys some statement of fact.” Id. at 1342.

The Court stated two ways for the government to avoid implicating this right. First, Doe’s decryption and production would have to be a physical act, not a testimonial act that “requires the use of the contents of his mind.” Second, the government would have to already know what was inside the drives. The government would only be asking Doe to produce the decrypted drives; the knowledge of the content would have been a foregone conclusion. However, the Court held that the government failed to satisfy either method. Doe’s decryption and production of the drives was a testimonial act, and the “factual communications associated with the decryption and production [we]re not foregone conclusions.” Id. at 1346.

Added:
>
>

Problems with the Court's Analysis

 While the Court’s analysis mostly seems correct, I have a few problems. First, regarding the distinction between a physical and a testimonial act, the Court lists some implied factual statements that determine whether Doe’s decryption and production of the drives would be testimonial. The Court states that “decryption and production would be tantamount to testimony by Doe of his knowledge of the existence and location of potentially incriminating files; of his possession, control, and access to the encrypted portions of the drives; and of his capability to decrypt those files.” Id. The latter two factors can be classified as using one’s mind, but the first factor should not be involved if Doe were to decrypt and produce the drives. By producing the drives, Doe would be showing that he had possession, control, and access to the drives and that he had the ability to decrypt the files. Regarding the first factor, however, Doe would not necessarily be showing that he had knowledge of the existence and location of potentially incriminating files. The government just needs the decryption passwords so it can access the encrypted partitions inside the drives.

Second, the Court uses a useful analogy in comparing Doe’s situation to surrendering a combination as opposed to surrendering a key; however, I believe that the Court’s analogy should focus on a different point. The Court believes that producing a key is a physical act while producing a combination is a testimonial act that requires use of the contents of one’s mind. The Court analogized Doe’s situation to producing a combination, saying that “[r]equiring Doe to use a decryption password is [like] requiring the production of a combination because [it demands] the use of the contents of the mind, and the production is accompanied by the implied factual statements noted above that could prove to be incriminatory.” Id.

Line: 21 to 27
 -- VictorA - 03 Mar 2013
Changed:
<
<
META TOPICMOVED by="VictorA" date="1362298999" from="CompPrivConst.TWikiGuestFirstPaper" to="CompPrivConst.VictorAuFirstPaper"
>
>
META TOPICMOVED by="VictorA" date="1367377465" from="CompPrivConst.VictorAuFirstPaper" to="CompPrivConst.VictorAFirstPaper"

Revision 6r6 - 01 May 2013 - 03:04:26 - VictorA
Revision 5r5 - 22 Apr 2013 - 19:05:28 - VictorA
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM