1 2 3 4 5 IN THE UNITED STATES DISTRICT COURT 6 FOR THE NORTHERN DISTRICT OF CALIFORNIA 7 8 UNITED STATES OF AMERICA, 9 Plaintiff, v. 10 United States District Court Northern District of California 11 RYAN MICHAEL SPENCER, Case No. 17-cr-00259-CRB-1 ORDER DENYING [DKT. 73] MOTION FOR RELIEF FROM ORDER OF MAGISTRATE JUDGE Defendant. 12 Ryan Michael Spencer moves for relief from an order by a magistrate judge 13 14 compelling him to decrypt several electronic devices. In re Search of a Residence in 15 Aptos, Calif. 95003, No. 17-mj-70656-JSC, 2018 WL 1400401 (N.D. Cal. March 20, 16 2018). Because the magistrate judge properly applied the foregone conclusion doctrine to 17 the facts of the case, the motion is DENIED. 18 19 20 I. BACKGROUND On April 26, 2017, a magistrate judge authorized a warrant for the FBI to search a 21 residence believed to be inhabited by Spencer. Specifically, the warrant authorized the 22 search of the premises and any computers, storage media, routers, modems, and network 23 equipment contained within, as well as Spencer himself, for evidence of child 24 pornography. 25 The FBI searched the residence and seized 12 electronic media items. It determined 26 that some of these contained child pornography. However, several of the devices were 27 encrypted, and their contents were therefore inaccessible. The United States sought an 28 order under the All Writs Act, 28 U.S.C. § 1651, compelling Spencer to decrypt three of 1 these devices: a smartphone, a laptop, and an external hard drive. Spencer admitted 2 ownership of the smartphone and laptop, and provided passwords to bypass the lock 3 screens (though not to decrypt portions of the devices’ hard drives). The external hard drive was seized from the same desk as the laptop. Spencer said United States District Court Northern District of California 4 5 he owned a hard drive matching the description of the one seized, and that he had 6 encrypted the hard drive using the same encryption software as that found on the recovered 7 drive. 8 The magistrate judge granted the government’s application on March 20, 2018, 9 ordering Spencer to aid in decrypting the three devices. In re Search of a Residence in 10 Aptos, Calif. 95003, No. 17-mj-70656-JSC, 2018 WL 1400401 (N.D. Cal. March 20, 11 2018). Spencer filed a motion for relief from the order on April 16. See Mot. for Relief 12 (dkt. 73). 13 14 15 II. LEGAL STANDARD A party may file a motion for relief with the district court from a dispositive pre- 16 trial ruling by a magistrate judge. Fed. R. Crim. P. 59(b)(2). A district court’s review of a 17 dispositive order by a magistrate judge is de novo. Fed. R. Crim. P. 59(b)(3). 18 The Fifth Amendment to the United States Constitution provides that “No 19 person . . . shall be Compelled in any criminal case to be a Witness against himself.” It 20 applies “only when the accused is compelled to make a Testimonial Communication that is 21 incriminating.” Fisher v. United States, 425 U.S. 391, 408 (1976). Accordingly, the Fifth 22 Amendment is not violated whenever the government compels a person to turn over 23 incriminating evidence. Id. at 409. Instead, it is only implicated when the act of 24 production itself is both “testimonial” and “incriminating.” Id. at 410. 25 The act of production is neither testimonial nor incriminating when the concession 26 implied by the act “adds little or nothing to the sum total of the Government’s information 27 by conceding that he in fact has the [evidence]”—that is, where the information conveyed 28 by the act of production is a “foregone conclusion.” Id. at 411. It is important to stress the 2 1 limited scope of the “foregone conclusion” rule. It only applies where the testimony at 2 issue is an implied statement inhering in the act of production itself. See United States v. 3 Apple MacPro Computer, 851 F.3d 238, 247 (3d Cir. 2017). Otherwise, the government 4 cannot compel a self-incriminating statement, regardless of whether the contents of the 5 statement are a “foregone conclusion.” See Fisher, 425 U.S. at 429 (Brennan, J., 6 concurring) (whether testimony is considered incriminating under the Fifth Amendment 7 does not “turn on the strength of the Government’s case”). For instance, the government could not compel Spencer to state the password itself, United States District Court Northern District of California 8 9 whether orally or in writing. 1 But the government is not seeking the actual passcode. 10 Rather, it seeks the decrypted devices. Spencer argues that production of the devices 11 would not fall within the act-of-production doctrine because producing the devices would 12 require him to enter the decryption password. In other words, Spencer argues that because 13 the government cannot compel him to state the passwords to the devices, it cannot compel 14 him to decrypt the devices using the passwords, either. This argument has some 15 superficial appeal, and finds support in a dissent by Justice John Paul Stevens, who once 16 contended that a defendant could “not . . . be compelled to reveal the combination to his 17 wall safe” either “by word or deed.” Doe, 487 U.S. at 219 (Stevens, J., dissenting) 18 (emphasis added). While the analogy is not perfect, we may assume that storing evidence 19 in encrypted devices is equivalent to securing items in a safe protected by a combination, 20 and that Justice Stevens’ reasoning applies equally to the situation at hand. See In re 21 Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335, 1346 (11th 22 Cir. 2012). 23 1 24 25 26 27 28 See Doe v. United States, 487 U.S. 201, 210 n.9 (1988) (stating in dicta that compelling someone to reveal the combination to his wall safe is testimonial for purposes of the Fifth Amendment); Wayne R. LaFave et al., 3 Criminal Procedure § 8.13(a) (4th ed. 2017) (“[R]equiring the subpoenaed party to reveal a passcode that would allow [the government] to perform the decryption . . . would require a testimonial communication standing apart from the act of production, and therefore make unavailable the foregone conclusion doctrine.”); accord, United States v. Kirschner, 823 F. Supp. 2d 665, 668-69 (E.D. Mich. 2010); In re Boucher, No. 2:06-mj-91, 2007 WL 4246473, at *3-4 (D. Vt. Nov. 29, 2007), overruled in part on other grounds, No. 2:06-mj-91, 2009 WL 424718 (D. Vt. Feb. 19, 2009); Com. Of Virginia v. Baust, No. CR14-1439, 2014 WL 6709960, at *3. 3 United States District Court Northern District of California 1 But a rule that the government can never compel decryption of a password- 2 protected device would lead to absurd results. Whether a defendant would be required to 3 produce a decrypted drive would hinge on whether he protected that drive using a 4 fingerprint key or a password composed of symbols. See New York v. Quarles, 467 U.S. 5 649, 671 (1984). Similarly, accepting the analogy to the combination-protected safe, 6 whether a person who receives a subpoena for documents may invoke the Fifth 7 Amendment would hinge on whether he kept the documents at issue in a combination safe 8 or a key safe. See Doe, 487 U.S. at 210 n.9. But this should make no difference, because 9 opening the safe does not require producing the combination to the government. Whether 10 turning over material, either in the form of documents or bits, implicates the Fifth 11 Amendment should not turn on the manner in which the defendant stores the material. 12 So: the government’s request for the decrypted devices requires an act of 13 production. Nevertheless, this act may represent incriminating testimony within the 14 meaning of the Fifth Amendment because it would amount to a representation that Spencer 15 has the ability to decrypt the devices. See Fisher, 425 U.S. at 410. Such a statement 16 would potentially be incriminating because having that ability makes it more likely that 17 Spencer encrypted the devices, which in turn makes it more likely that he himself put the 18 sought-after material on the devices. 19 The next question is whether the foregone conclusion rule applies. There is some 20 confusion in the case law regarding what exactly the relevant “foregone conclusion” must 21 be where the government seeks decryption of hard drives. The Eleventh Circuit has held 22 that the government must show that it is a foregone conclusion not only that the defendant 23 has the ability to decrypt the device(s), but also that certain files are on the device(s). In re 24 Grand Jury Subpoena, 670 F.3d at 1347. The In re Grand Jury Subpoena court denied the 25 government’s attempt to compel the defendant to decrypt the device at issue in that case 26 because it “‘ha[d] not shown that it had any prior knowledge of either the existence or the 27 whereabouts of the [files]’” on the device. Id. (alterations in original). 28 The Eleventh Circuit was relying on precedent in which the government requested 4 United States District Court Northern District of California 1 specific documents from a defendant pursuant to subpoena. See Fisher, 425 U.S. at 410. 2 In Fisher, “Compliance with the subpoena tacitly concede[d] the existence of the papers 3 demanded and their possession or control” by the defendant. Id. Not so in cases like the 4 one at hand, in which the government seeks entire hard drives. Turning over the decrypted 5 devices would not be tantamount to an admission that specific files, or any files for that 6 matter, are stored on the devices, because the government has not asked for any specific 7 files. Accordingly, the government need only show it is a foregone conclusion that 8 Spencer has the ability to decrypt the devices. 2 That the government may have access to 9 more materials where it seeks a hard drive through a search warrant than it would have had 10 if it sought specific files through subpoena is simply a matter of the legal tool the 11 government uses to seek access. To the extent Spencer contends that the government has 12 not adequately identified the files it seeks, that is an issue properly raised under the Fourth 13 Amendment, not the Fifth. The only remaining question insofar as the applicable legal framework goes is what 14 15 standard the Court must apply in evaluating whether Spencer’s knowledge of the 16 passwords is a “foregone conclusion.” In the context of requests for specific documents, 17 the government is required to establish independent knowledge “of the existence, 18 possession, and authenticity of subpoenaed documents with ‘reasonable particularity’ 19 before the communication inherent in the act of production can be considered a foregone 20 conclusion.” United States v. Hubbell, 167 F.3d 552, 579 (D.C. Cir. 1999), aff’d, 530 U.S. 21 27 (2000). The “reasonable particularity” standard appears to have been derived from the 22 standard courts use to evaluate whether a warrant is sufficiently specific under the Fourth 23 24 25 26 27 28 2 See Orin Kerr, Fifth Amendment protects passcode on smartphones, court holds, Wash. Post (Sept. 24, 2015), https://www.washingtonpost.com/news/volokhconspiracy/wp/2015/09/24/fifth-amendment-protects-passcode-on-smartphones-courtholds/?noredirect=on&utm_term=.92228f257a5d (“The details of what records are on the phone should be irrelevant to whether the foregone conclusion doctrine applies because access to the phone is independent of what records are stored inside it. Handing over the passcode has the same testimonial aspect regardless of what is on the phone.”); Apple MacPro Computer, 851 F.3d at 248 n.7; In re Search of a Residence in Aptos, Calif. 95003, 2018 WL 1400401, at *6 n.10. 5 1 Amendment. See Stanford v. State of Tex., 379 U.S. 476, 485 (1965). Courts have continued to apply that standard to cases involving compelled United States District Court Northern District of California 2 3 decryption under the Fifth Amendment. See, e.g., In re Grand Jury Subpoena, 670 F.3d at 4 1349; Apple MacPro Computer, 851 F.3d at 247. But it is nonsensical to ask whether the 5 government has established with “reasonable particularity” that the defendant is able to 6 decrypt a device. While physical evidence may be described with more or less specificity 7 with respect to both appearance and location, a defendant’s ability to decrypt is not subject 8 to the same sliding scale. He is either able to do so, or he is not. Accordingly, the 9 reasonable particularity standard cannot apply to a defendant’s ability to decrypt a device. 10 (In any event, “reasonable particularity” is not really an evidentiary standard at all. It is 11 better viewed as a substantive standard that helps to ensure that any testimony at issue 12 really is a “foregone conclusion.”) The appropriate standard is instead clear and convincing evidence. This places a 13 14 high burden on the government to demonstrate that the defendant’s ability to decrypt the 15 device at issue is a foregone conclusion. But a high burden is appropriate given that the 16 “foregone conclusion” rule is an exception to the Fifth Amendment’s otherwise jealous 17 protection of the privilege against giving self-incriminating testimony. See Fisher, 425 18 U.S. at 429 (Brennan, J., concurring). 19 20 III. DISCUSSION 21 The question, accordingly, is whether the government has shown by clear and 22 convincing evidence that Spencer’s ability to decrypt the three devices is a foregone 23 conclusion. It has. All three devices were found in Spencer’s residence. Spencer has 24 conceded that he owns the phone and laptop, and has provided the login passwords to both. 25 Moreover, he has conceded that he purchased and encrypted an external hard drive 26 matching the description of the one found by the government. This is sufficient for the 27 government to meet its evidentiary burden. The government may therefore compel 28 Spencer to decrypt the devices. Once Spencer decrypts the devices, however, the 6 1 government may not make direct use of the evidence that he has done so. See Robert P. 2 Mosteller, Simplifying Subpoena Law: Taking the Fifth Amendment Seriously, 73 Va. L. 3 Rev. 1, 110 n.108 (1987). If it really is a foregone conclusion that he has the ability to do 4 so, such that his decryption of the device is not testimonial, then the government of course 5 should have no use for evidence of the act of production itself. Spencer also contends that the magistrate judge erred in holding that the United States District Court Northern District of California 6 7 government properly relies on the All Writs Act, 28 U.S.C. § 1651, to compel Spencer to 8 decrypt the devices at issue. She did not. Spencer is “not ‘far removed from the 9 underlying controversy’”; compliance “‘require[s] minimal effort’”; and without Spencer’s 10 assistance, “‘there is no conceivable way in which the [search warrant] authorized by the 11 District Court could [be] successfully accomplished.’” See Apple MacPro Computer, 851 12 F.3d at 246 (quoting United States v. New York Tel. Co., 434 U.S. 159, 174–75 (1977)) 13 (alterations in original). 14 15 16 17 IV. CONCLUSION The magistrate judge’s order was correct in all respects. The motion for relief is DENIED. 18 IT IS SO ORDERED. 19 Dated: April 26, 2018 CHARLES R. BREYER United States District Judge 20 21 22 23 24 25 26 27 28 7