Illinois Appeals Court Says Fifth Amendment Protections Apply To Cellphone Passwords

from the reel-those-rods-back-in,-boys dept

The key to determining Fifth Amendment protections against compelled production of passwords appears to be a court’s definition of the term “foregone conclusion.” In many cases, courts have decided the government only has to clear a very low bar to meet this demand. In those cases, the only “foregone conclusion” the government needs to prove is that the person being compelled to provide a password knows the password. Once the government has linked the person to the locked device, it can get on with the compelling.

If a court decides to raise the bar, it gets far more difficult for the government. In a few cases, the government has been asked to show it knows the evidence it seeks can be found in the locked device. Even if it meets this requirement, it can’t just start throwing court orders at the criminal suspect. This “foregone conclusion” directly implicates the Fifth Amendment. The government is no longer simply asking someone to unlock a device. It’s asking them to directly provide them with evidence that could be used against them.

An Illinois state appeals court has decided the Fifth Amendment protects defendants from producing evidence to be used against them. (via FourthAmendment.com) In this case, the defendant was a passenger in a car stopped by law enforcement. A drug dog alerted on a leather bag belonging to the defendant. The ensuing search uncovered a prescription pill bottle containing cocaine, resulting in a charge of possession with intent to distribute.

That’s not all the cops found. They also found the suspect’s cellphone, which he refused to unlock for them. The prosecution asked the court to force the defendant to provide the password. The trial court declined to do so, saying compelled production of evidence violated the Fifth Amendment. The appeal followed, and the government has now been told twice [PDF] there will be no compelled password production. First, it explains this exception to the Fifth Amendment, which is now enjoying its heyday (so to speak):

The foregone conclusion doctrine is an exception to the fifth amendment privilege. Fisher, 425 U.S. at 411. Per the doctrine, where the existence, location and authenticity of the evidence is a foregone conclusion, that is, it “adds little or nothing to the sum total of the Government’s information,” the fifth amendment does not protect the act of production. Id. The exception applies when the State demonstrates with “reasonable particularity” that when it sought the act of production, the State knew the evidence existed, the evidence was in the defendant’s possession and it was authentic. United States v. Greenfield, 831 F.3d 106, 116 (2d Cir. 2016).

The court then points out what the government ultimately wants is what lies beyond the password, not the password itself.

Here, the State is not seeking the passcode per se but the information it will decrypt. The cases that declare the passcode to be a nontestimonial communication operate under the framework that the passcode is the testimonial communication and that it falls under the foregone conclusion exception to the fifth amendment privilege. We consider that the proper focus is not on the passcode but on the information the passcode protects. The State claims it sustained its burden of proving with reasonable particularity that it knew the passcode existed, that Spicer knew the passcode and that it would be authenticated by entering it into Spicer’s phone. However, what the State actually needed to establish with reasonable particularity was the contents of the phone, which it did not do.

If the state wants to satisfy this requirement, it needs to do far more than it has. So far, all that’s been shown is that the officer seeking the search warrant imagines the cellphone will contain plenty of information relevant to the distribution charges, like… um… pretty much the phone’s entire contents. The appeals court doesn’t care for the breadth of the government’s supposition.

The State does not know what information might be on Spicer’s phone but surmises that cell phones are often used in unlawful drug distribution and such information would be available on Spicer’s phone. The State has not provided a particularized description of that information or even evidence that any useful information exists on the phone. The State sought and was granted in the search warrant access to most of the information in Spicer’s phone, including call logs, text messages, multimedia messages, instant messaging communications, voicemail, e-mail, all messaging applications, phonebook contacts, videos, photographs, Internet browsing and mapping history and GPS data between May 24 and June 24, 2017. The State does not identify any documents or specific information it seeks with reasonable particularity. The State is engaging in a fishing expedition and the foregone conclusion exception does not apply here.

The foregone conclusion the government has to work with is far smaller than the foregone conclusion it thought it had:

While the State is aware that the passcode existed and that Spicer knew it, the State could not know that the passcode was authentic until after it was used to decrypt Spicer’s phone. Moreover, the production of Spicer’s passcode would provide the State more information than what it already knew. Although the focus of the foregone conclusion is on the passcode, in our view, it properly should be placed on the information the State is ultimately seeking, which is not the passcode but everything on Spicer’s phone.

The court’s decision isn’t a blanket statement saying compelled password production will always violate the Fifth Amendment. But it should serve as a warning to law enforcement officers who think they should be able to dig through every phone they seize, no matter how weak their affidavit rationalizations or how tangential the supposed evidence might be to the filed charges.

Filed Under: , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Illinois Appeals Court Says Fifth Amendment Protections Apply To Cellphone Passwords”

Subscribe: RSS Leave a comment
12 Comments
Anonymous Coward says:

Re: Re:

Law enforcement already obtains their biometrics. You get fingerprinted on arrest, so law enforcement could (with a bit of work) print out a 3D printed fingerprint to use to gain access to the phone. I suspect they’d use that as a means to argue that compelling the arrested to unlock phones via fingerprint is merely a convenience and a time/money-saver and not something they actually need to do since they could print off the fingerprints in a usable form to unlock the phone.

It’d still be bullshit though, and an example of why you NEVER use biometrics as a sole/primary form of authentication. It should only be secondary or tertiary (and frankly shouldn’t be used at all if the system could lock you out if you happen to lose a digit due to amputation, etc).

That One Guy (profile) says:

Re: Re: Re:

It’d still be bullshit though, and an example of why you NEVER use biometrics as a sole/primary form of authentication. It should only be secondary or tertiary (and frankly shouldn’t be used at all if the system could lock you out if you happen to lose a digit due to amputation, etc).

Biometrics can be used as a account name.

Biometrics should never be used as an account password.

That One Guy (profile) says:

Ya think?

Although the focus of the foregone conclusion is on the passcode, in our view, it properly should be placed on the information the State is ultimately seeking, which is not the passcode but everything on Spicer’s phone.

About bloody time a court got enough of a spine to figure that out and actually rule accordingly. The goal isn’t the password, it’s what the password unlocks, and if they are trying for that the fifth most certainly applies.

Per the doctrine, where the existence, location and authenticity of the evidence is a foregone conclusion, that is, it “adds little or nothing to the sum total of the Government’s information,” the fifth amendment does not protect the act of production.

And this is just legalized bullshit. If the government has ‘little or nothing’ after forcing someone to provide information, then what exactly was important enough to force them to do so in the first place? If they already have the evidence they need then they don’t need to force someone to provide it for them, the entire point is to get what they don’t currently have, such that the idea that the fifth isn’t implicated is beyond absurd and should have been seen as a blatant attempt to bypass it when it was first proposed.

That One Guy (profile) says:

Re: Re:

They seem to see it rightly as a check against their ability to do what they want, and rather than accept that there’s a good reason to have that check they instead work to bypass and/or weaken it so that they can get back to doing whatever they want, secure in the knowledge that as The Good Guys anything that prevents them from acting has to be Bad, and thereby they’re doing nothing wrong getting rid of it.

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...