New Jersey Supreme Court Says 'Forgone Conclusion' Trumps Fifth Amendment In Crooked Cop Case

from the tired:-4th-Amendment-exceptions-wired:-Fifth-Amendment-exceptions dept

The New Jersey Supreme Court has made the Fifth Amendment discussion surrounding compelled production of passwords/passcodes more interesting. And by interesting, I mean frustrating. (h/t Orin Kerr)

The issue is far from settled and the nation's top court hasn't felt like settling it yet. Precedent continues to accumulate, but it's contradictory and tends to hinge on each court's interpretation of the "foregone conclusion" concept.

If the only conclusion that needs to be reached by investigators is that the suspect owns the device and knows the password, it often results in a ruling that says compelled decryption doesn't violate the Fifth Amendment, even if it forces the suspect to produce evidence that could be used against them. Less charitable readings of this concept recognize that "admitting" to ownership of a device is admitting to ownership of everything in it, and view the demand for passcodes as violating Fifth Amendment protections against self-incrimination. The stronger the link between the suspect and the phone, the less Fifth Amendment there is to go around.

This decision [PDF] deals with a crooked cop. Sheriff's officer Robert Andrews apparently tipped off a drug dealer who was being investigated. The dealer tipped off law enforcement about Andrews' assistance with avoiding police surveillance -- something that involved Officer Andrews telling the drug suspect to ditch phones he knew were being tapped and giving him information about vehicles being used by undercover officers.

Two iPhones were seized from Andrews who refused to unlock them for investigators. Investigators claimed they had no other option but force Andrews to unlock them. According to the decision, there was no workaround available at that time (at some point in late 2015 or early 2016).

According to the State, its Telephone Intelligence Unit was unable to search Andrews’s iPhones -- an iPhone 6 Plus and an iPhone 5s -- because they “had iOS systems greater [than] 8.1, making them extremely difficult to access without the owner/subscriber’s pass code.” A State detective contacted and conferred with the New York Police Department’s (NYPD) Technical Services unit, as well as a technology company called Cellebrite, both of which concluded that the cellphones’ technology made them inaccessible to law enforcement agencies. The detective also consulted the Federal Bureau of Investigation’s Regional Computer Forensics Laboratory, which advised that it employed “essentially the same equipment used by” the State and NYPD and would be unable to access the phones’ contents. The State therefore moved to compel Andrews to disclose the passcodes to his two iPhones.

Apple implemented encryption-by-default in September 2014. Andrews was arrested in July 2015. This would be about the same time the DOJ was trying to force Apple to crack open an iPhone for it in the San Bernardino shooting case. This was ultimately resolved by an outside contractor (most likely Cellebrite), but it appears that no one had a workable solution when investigators in this case attempted to crack the seized phones.

Andrews challenged the compelled production of passcodes, claiming this violated his Fifth Amendment rights. The trial court disagreed, as did the state appeals court. The state's top court arrives at the same conclusion.

The state argued it actually knew far more than what's needed to clear the "foregone conclusion" bar.

[T]he State argues that communication between co-conspirators has no special privacy status, that the State “has established . . . that it already knows what is on the phone[s],” and that the State has a superior right to the contents of the phones because of the unchallenged search warrant.

The court finds in favor of the state, but it does recognize that passcodes are more testimonial than fingerprints or other biometric features used to unlock devices.

A cellphone’s passcode is analogous to the combination to a safe, not a key. Communicating or entering a passcode requires facts contained within the holder’s mind -- the numbers, letters, or symbols composing the passcode. It is a testimonial act of production.

It also recognizes there may be no clear way to distinguish between passcodes and biometrics when dealing with compelled production.

We also share the concerns voiced by other courts that holding passcodes exempt from production whereas biometric device locks may be subject to compulsion creates inconsistent approaches based on form rather than substance. The distinction becomes even more problematic when considering that, at least in some cases, a biometric device lock can be established only after a passcode is created, calling into question the testimonial/non-testimonial distinction in this context.

The court says the state has proven enough to be granted the "foregone conclusion" exception to the Fifth Amendment.

The State’s demonstration of the passcodes’ existence, Andrews’s previous possession and operation of the cellphones, and the passcodes’ self-authenticating nature render the issue here one of surrender, not testimony, and the foregone conclusion exception to the Fifth Amendment privilege against self-incrimination thus applies. Therefore, the Fifth Amendment does not protect Andrews from compelled disclosure of the passcodes to his cellphones.

The dissent disagrees. It says that although the tech has changed, the underlying principles of the Fifth Amendment haven't. And it's not just the dissent saying this. It's also the nation's top court, which has never held that the compelled production of incriminating testimony complies with the Constitution.

In a world where the right to privacy is constantly shrinking, the Constitution provides shelter to our innermost thoughts -- the contents of our minds -- from the prying eyes of the government. The right of individuals to be free from the forced disclosure of the contents of their minds to assist law enforcement in a criminal investigation, until now, has been an inviolate principle of our law, protected by the Fifth Amendment and our state common law. No United States Supreme Court case presently requires otherwise. No case from this Court has held otherwise. That protection deserves utmost respect and should not be lessened to authorize courts to compel a defendant to reveal the passcode to a smartphone so law enforcement can access its secured contents.

Given the current split in both federal district courts and state courts on the issue, the dissent says the New Jersey Supreme Court shouldn't be an enabler of potential Fifth Amendment violations in the absence of US Supreme Court precedent.

Until the Court clarifies its intentions about application of the act of production doctrine in this setting, I would follow the only sure directional signs the Court has given…

Things may be slightly harder for investigators at the moment, but it's not the court's role to make things easier for the government. They're supposed to be a check against government power grabs, not an ally in its attempts to limit the protections it supposedly granted to its citizens. We live in a "golden age of surveillance." There's more information available in unencrypted form than there's ever been. And the arms race between device makers and encryption crackers is ongoing. It hasn't ended and device encryption has not been declared the winner.

Law enforcement must find another means of obtaining access to the encrypted substantive information on two cell phones whose contents it wishes to search and for which the government has a search warrant. Technological barriers must be overcome without sacrificing constitutional, deep-seated historical protections against governmental intrusions forcing individuals to become assistants in their own prosecutions. Modern technology continues to evolve, bringing new problems; but it also may bring new solutions.

But that's just the dissent. The majority says the Fifth Amendment can be bypassed if the state can find enough connective tissue between the locked device and the person who refuses to unlock it.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: 5th amendment, compelled production, encryption, new jersey, new jersey supreme court, passwords, robert andrews

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. identicon
    Anonymous Coward, 20 Aug 2020 @ 9:22pm

    I had been thinking how the right of the government to obtain a search warrant for RECORDS could be balanced by the right of the accused to PRIVACY and NON-SELF-INCRIMINATION.

    First, clearly, if the government can't prove the accused owns the phone, all bets are off. [In this case, that seems to have been settled.]

    Second, clearly, if the government doesn't have adequate reason to believe there are relevant records on the phone, the warrant ought to be quashed. [Here, the records are confirmed by testimony and phone-co. records.]

    Third, the desired records have to be specified and limited to the purpose--not just a "let's go phishing on his fone" like the usual warrants demand. [Here, the desired records are limited to things legitimately related to the alleged actions.]

    So much for self-incrimination. But how about privacy? Once the cops get their grubby hands on the phone, they can phish phreely.

    Here's where I thought: the phone needs to be examined by a neutral third party, who can identify and turn-over only the relevant records, leaving the government unaware of whatever else was on the phone. And, lo and behold, that too was done here. Neither the phone nor the passcode would be turned over to the government; instead, the unlocked phone could be examined with a judge, a defense attorney, and a government representative present. You aren't going to get a better deal than that: You HAVE to open the safe, but your lawyer gets a say in which records get turned over. Do you think any judge anywhere is going to say about a metal safe, "No, you don't have to give up the combination--the government is not allowed to get any documents from your locked safe under any circumstances"? No. You can open the safe and retrieve the required objects, or they can blow the safe and look through everything--your choice. Remember, the "secure in your home and possession" bit only applies in the absence of a valid warrant. And "self-incrimination" can't apply to whether or not he knows the password if the police can prove he owns the phone.

    So it seems to me that the court gave the accused all the protection and privacy he was constitutionally allowed--provided he gave up all (and ONLY) the records required by the warrant. This is a ruling that honest people both in and out of government should be able to live with.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Make this the First Word or Last Word. No thanks. (get credits or sign in to see balance)    
  • Remember name/email/url (set a cookie)

Follow Techdirt

Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.